#VU125071 Server-Side Request Forgery (SSRF) in OpenClaw
Published: April 7, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote attacker to perform server-side request forgery.
The vulnerability exists due to server-side request forgery in Microsoft Teams attachment and media fetch handling when processing Graph metadata, hosted-content, and attachment fetches across mixed fetch paths. A remote attacker can trigger requests through paths that bypass the shared SSRF guard model to perform server-side request forgery.
The issue stems from inconsistent host and DNS enforcement across redirect and fetch hops, including attachment authentication-retry flows.