CVE-2026-32019
Published: 19 March 2026
Summary
CVE-2026-32019 is a high-severity SSRF (CWE-918) vulnerability in Openclaw Openclaw. Its CVSS base score is 7.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SC-7 (Boundary Protection) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validating information inputs to prevent malicious or malformed data, directly mitigating the incomplete IPv4 special-use range validation flaw in isPrivateIpv4() that enables SSRF bypasses.
Mandates timely identification, reporting, and remediation of system flaws, enabling application of patches from specified GitHub commits to fix the SSRF vulnerability in OpenClaw.
Enforces monitoring and control of communications at boundaries to block outbound requests to RFC-reserved and special-use IPv4 ranges like 198.18.0.0/15, preventing SSRF exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SSRF in public-facing web_fetch directly enables T1190 exploitation; bypass of private range checks facilitates internal IP/port probing for T1046 Network Service Discovery and T1018 Remote System Discovery.
NVD Description
OpenClaw versions prior to 2026.2.22 contain incomplete IPv4 special-use range validation in the isPrivateIpv4() function, allowing requests to RFC-reserved ranges to bypass SSRF policy checks. Attackers with network reachability to special-use IPv4 ranges can exploit web_fetch functionality to access blocked…
more
addresses such as 198.18.0.0/15 and other non-global ranges.
Deeper analysisAI
CVE-2026-32019 is a server-side request forgery (SSRF) vulnerability, classified as CWE-918, affecting OpenClaw versions prior to 2026.2.22. The issue stems from incomplete IPv4 special-use range validation in the isPrivateIpv4() function, which fails to properly block requests to RFC-reserved ranges. This flaw enables SSRF policy bypasses within the web_fetch functionality, allowing access to non-global addresses such as 198.18.0.0/15. The vulnerability carries a CVSS v3.1 base score of 7.4 (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L) and was published on 2026-03-19.
Attackers with low privileges and network reachability to special-use IPv4 ranges can exploit this vulnerability over the network with low complexity and no user interaction required. By targeting the web_fetch functionality with crafted requests to reserved ranges, they can bypass SSRF protections, achieving low-impact confidentiality, integrity, and availability effects across a changed scope.
Mitigation requires upgrading to OpenClaw 2026.2.22 or later. Patches addressing the incomplete validation are available in the following GitHub commits: 333fbb86347998526dd514290adfd5f727caa6d9, 44dfbd23df453e51b71ef79a148c28c53e89168c, 71bd15bb4294d3d1b54386064d69cd0f5f731bd8, and f14ebd743cfc73f667fae80af70043d0ab1f88bd. Further details are provided in the GitHub Security Advisory at GHSA-4rqq-w8v4-7p47.
Details
- CWE(s)