Vulnerability Description
OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, Cron webhook delivery in src/gateway/server-cron.ts uses fetch() directly, so webhook targets can reach private/metadata/internal endpoints without SSRF policy checks. This issue was fixed in version 2026.2.19.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openclaw | Openclaw | <= 2026.2.17 |
Related Weaknesses (CWE)
References
- https://github.com/openclaw/openclaw/commit/99db4d13e5c139883ef0def9ff963e927317Patch
- https://github.com/openclaw/openclaw/releases/tag/v2026.2.19Release Notes
- https://github.com/openclaw/openclaw/security/advisories/GHSA-w45g-5746-x9fpVendor Advisory
FAQ
What is CVE-2026-27488?
CVE-2026-27488 is a vulnerability with a CVSS score of 7.3 (HIGH). OpenClaw is a personal AI assistant. In versions 2026.2.17 and below, Cron webhook delivery in src/gateway/server-cron.ts uses fetch() directly, so webhook targets can reach private/metadata/internal ...
How severe is CVE-2026-27488?
CVE-2026-27488 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-27488?
Check the references section above for vendor advisories and patch information. Affected products include: Openclaw Openclaw.