Cyber Posture

CVE-2026-32019

HighPublic PoC

Published: 19 March 2026

Published
19 March 2026
Modified
20 April 2026
KEV Added
Patch
CVSS Score 7.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
EPSS Score 0.0004 13.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32019 is a high-severity SSRF (CWE-918) vulnerability in Openclaw Openclaw. Its CVSS base score is 7.4 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SC-7 (Boundary Protection) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validating information inputs to prevent malicious or malformed data, directly mitigating the incomplete IPv4 special-use range validation flaw in isPrivateIpv4() that enables SSRF bypasses.

prevent

Mandates timely identification, reporting, and remediation of system flaws, enabling application of patches from specified GitHub commits to fix the SSRF vulnerability in OpenClaw.

preventdetect

Enforces monitoring and control of communications at boundaries to block outbound requests to RFC-reserved and special-use IPv4 ranges like 198.18.0.0/15, preventing SSRF exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1046 Network Service Discovery Discovery
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
T1018 Remote System Discovery Discovery
Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system.
Why these techniques?

SSRF in public-facing web_fetch directly enables T1190 exploitation; bypass of private range checks facilitates internal IP/port probing for T1046 Network Service Discovery and T1018 Remote System Discovery.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenClaw versions prior to 2026.2.22 contain incomplete IPv4 special-use range validation in the isPrivateIpv4() function, allowing requests to RFC-reserved ranges to bypass SSRF policy checks. Attackers with network reachability to special-use IPv4 ranges can exploit web_fetch functionality to access blocked…

more

addresses such as 198.18.0.0/15 and other non-global ranges.

Deeper analysisAI

CVE-2026-32019 is a server-side request forgery (SSRF) vulnerability, classified as CWE-918, affecting OpenClaw versions prior to 2026.2.22. The issue stems from incomplete IPv4 special-use range validation in the isPrivateIpv4() function, which fails to properly block requests to RFC-reserved ranges. This flaw enables SSRF policy bypasses within the web_fetch functionality, allowing access to non-global addresses such as 198.18.0.0/15. The vulnerability carries a CVSS v3.1 base score of 7.4 (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L) and was published on 2026-03-19.

Attackers with low privileges and network reachability to special-use IPv4 ranges can exploit this vulnerability over the network with low complexity and no user interaction required. By targeting the web_fetch functionality with crafted requests to reserved ranges, they can bypass SSRF protections, achieving low-impact confidentiality, integrity, and availability effects across a changed scope.

Mitigation requires upgrading to OpenClaw 2026.2.22 or later. Patches addressing the incomplete validation are available in the following GitHub commits: 333fbb86347998526dd514290adfd5f727caa6d9, 44dfbd23df453e51b71ef79a148c28c53e89168c, 71bd15bb4294d3d1b54386064d69cd0f5f731bd8, and f14ebd743cfc73f667fae80af70043d0ab1f88bd. Further details are provided in the GitHub Security Advisory at GHSA-4rqq-w8v4-7p47.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.2.22

CVEs Like This One

CVE-2026-43526Same product: Openclaw Openclaw
CVE-2026-34504Same product: Openclaw Openclaw
CVE-2026-35629Same product: Openclaw Openclaw
CVE-2026-31989Same product: Openclaw Openclaw
CVE-2026-41912Same product: Openclaw Openclaw
CVE-2026-22181Same product: Openclaw Openclaw
CVE-2026-28476Same product: Openclaw Openclaw
CVE-2026-6011Same product: Openclaw Openclaw
CVE-2026-41914Same product: Openclaw Openclaw
CVE-2026-41302Same product: Openclaw Openclaw

References