#VU125116 Server-Side Request Forgery (SSRF) in OpenClaw

 

#VU125116 Server-Side Request Forgery (SSRF) in OpenClaw

Published: April 8, 2026


Vulnerability identifier: #VU125116
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: N/A
CWE-ID: CWE-918
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
OpenClaw
Software vendor:
OpenClaw

Description

The vulnerability allows a remote user to cause gateway-host fetches to off-node destinations and disclose limited information, modify limited data, or affect availability.

The vulnerability exists due to server-side request forgery (SSRF) in camera URL payload handling when processing user-supplied camera.snap, camera.clip, camera_snap, or camera_clip URL fields. A remote user can supply a crafted URL to cause gateway-host fetches to off-node destinations and disclose limited information, modify limited data, or affect availability.

User interaction is required, and exploitation is limited to deployments where paired nodes are not fully trusted.


Remediation

Install security update from vendor's website.

External links