Server-Side Request Forgery (SSRF) in OpenClaw - CVE-2026-32037

 

Server-Side Request Forgery (SSRF) in OpenClaw - CVE-2026-32037

Published: May 1, 2026


Vulnerability identifier: #VU128821
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2026-32037
CWE-ID: CWE-918
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
OpenClaw
Software vendor:
OpenClaw

Description

The vulnerability allows a remote attacker to perform server-side request forgery.

The vulnerability exists due to insufficient destination validation in MSTeams media download flows when processing attachment URLs that trigger redirect chains. A remote attacker can supply or influence an attachment URL to perform server-side request forgery.

The issue affects specific attachment paths where redirects were not consistently constrained to allowlisted targets before fetched content was accepted.


Remediation

Install security update from vendor's website.

External links