Cyber Posture

CVE-2026-34504

HighPublic PoC

Published: 31 March 2026

Published
31 March 2026
Modified
02 April 2026
KEV Added
Patch
CVSS Score 8.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
EPSS Score 0.0005 16.8th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-34504 is a high-severity SSRF (CWE-918) vulnerability in Openclaw Openclaw. Its CVSS base score is 8.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 16.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-4 enforces information flow control policies that directly prevent unauthorized server-side requests to internal URLs exploited in this SSRF vulnerability.

prevent

SI-10 validates inputs like URLs in the image-generation-provider.ts fetches, blocking malicious requests to internal services.

prevent

SC-7 monitors and controls communications at system boundaries, restricting SSRF exploitation of internal service metadata and responses.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1018 Remote System Discovery Discovery
Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system.
Why these techniques?

SSRF in public-facing application directly enables remote exploitation (T1190); unguarded internal URL fetches facilitate discovery of internal systems/services and metadata (T1018).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenClaw before 2026.3.28 contains a server-side request forgery vulnerability in the fal provider image-generation-provider.ts component that allows attackers to fetch internal URLs. A malicious or compromised fal relay can exploit unguarded image download fetches to expose internal service metadata and…

more

responses through the image pipeline.

Deeper analysisAI

CVE-2026-34504 is a server-side request forgery (SSRF) vulnerability (CWE-918) affecting OpenClaw versions prior to 2026.3.28. The issue resides in the fal provider's image-generation-provider.ts component, where unguarded image download fetches enable attackers to make requests to internal URLs. This flaw has a CVSS v3.1 base score of 8.3 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L), indicating high severity due to its network accessibility, low complexity, lack of required privileges or user interaction, and scope expansion.

A malicious or compromised fal relay can exploit this vulnerability by leveraging the image pipeline to fetch internal service metadata and responses. Attackers require the ability to interact with the fal provider but face no authentication barriers, allowing remote exploitation over the network to indirectly access and exfiltrate sensitive internal resources.

Mitigation is addressed in OpenClaw version 2026.3.28 and later, with a specific patch available in GitHub commit 80d1e8a11a2ac118c7f7a70bba9c862b6141d928. Security practitioners should consult the official GitHub security advisory (GHSA-qxgf-hmcj-3xw3) and VulnCheck advisory for detailed remediation steps and verification guidance.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.3.28

CVEs Like This One

CVE-2026-32019Same product: Openclaw Openclaw
CVE-2026-35629Same product: Openclaw Openclaw
CVE-2026-31989Same product: Openclaw Openclaw
CVE-2026-41912Same product: Openclaw Openclaw
CVE-2026-22181Same product: Openclaw Openclaw
CVE-2026-28476Same product: Openclaw Openclaw
CVE-2026-6011Same product: Openclaw Openclaw
CVE-2026-41914Same product: Openclaw Openclaw
CVE-2026-41302Same product: Openclaw Openclaw
CVE-2026-43526Same product: Openclaw Openclaw

References