Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-g99v-8hwm-g76g | OpenClaw has web_search citation redirect SSRF via private-network-allowing policy |
Thu, 19 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Mar 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.3.1 contain a server-side request forgery vulnerability in web_search citation redirect resolution that uses a private-network-allowing SSRF policy. An attacker who can influence citation redirect targets can trigger internal-network requests from the OpenClaw host to loopback, private, or internal destinations. | |
| Title | OpenClaw < 2026.3.1 - Server-Side Request Forgery via web_search Citation Redirect | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-918 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-19T13:39:03.247Z
Reserved: 2026-03-10T19:48:11.110Z
Link: CVE-2026-31989
Updated: 2026-03-19T13:38:59.455Z
Status : Analyzed
Published: 2026-03-19T02:16:03.430
Modified: 2026-03-19T19:18:07.110
Link: CVE-2026-31989
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:10:39Z
Github GHSA