Vulnerability Description
OpenClaw versions prior to 2026.2.22 contain incomplete IPv4 special-use range validation in the isPrivateIpv4() function, allowing requests to RFC-reserved ranges to bypass SSRF policy checks. Attackers with network reachability to special-use IPv4 ranges can exploit web_fetch functionality to access blocked addresses such as 198.18.0.0/15 and other non-global ranges.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openclaw | Openclaw | < 2026.2.22 |
Related Weaknesses (CWE)
References
- https://github.com/openclaw/openclaw/commit/333fbb86347998526dd514290adfd5f727caPatch
- https://github.com/openclaw/openclaw/commit/44dfbd23df453e51b71ef79a148c28c53e89Patch
- https://github.com/openclaw/openclaw/commit/71bd15bb4294d3d1b54386064d69cd0f5f73Patch
- https://github.com/openclaw/openclaw/commit/f14ebd743cfc73f667fae80af70043d0ab1fPatch
- https://github.com/openclaw/openclaw/security/advisories/GHSA-4rqq-w8v4-7p47Vendor Advisory
- https://www.vulncheck.com/advisories/openclaw-incomplete-ipv4-special-use-range-Third Party Advisory
FAQ
What is CVE-2026-32019?
CVE-2026-32019 is a vulnerability with a CVSS score of 7.4 (HIGH). OpenClaw versions prior to 2026.2.22 contain incomplete IPv4 special-use range validation in the isPrivateIpv4() function, allowing requests to RFC-reserved ranges to bypass SSRF policy checks. Attack...
How severe is CVE-2026-32019?
CVE-2026-32019 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-32019?
Check the references section above for vendor advisories and patch information. Affected products include: Openclaw Openclaw.