GHSA-9Q7V-8MR7-G23P: Server-Side Request Forgery (SSRF) in OpenClaw AI Assistant
Vulnerability ID: GHSA-9Q7V-8MR7-G23P
CVSS Score: 7.6
Published: 2026-04-02
OpenClaw versions prior to v2026.3.31 suffer from a high-severity Server-Side Request Forgery (SSRF) vulnerability. The application fails to validate user-supplied URLs in the Ollama extension and Marketplace plugin downloader, allowing unauthenticated or authenticated attackers to perform outbound HTTP requests to arbitrary internal and external resources.
TL;DR
A Server-Side Request Forgery (SSRF) flaw in OpenClaw allows attackers to access internal network resources via unvalidated URL inputs in the Ollama configuration and Marketplace plugin downloader.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-918
- Attack Vector: Network
- CVSS v3.1 Score: 7.6
- Impact: High - Confidentiality and Integrity
- Exploit Status: Proof of Concept Available
- Affected Components: Ollama Extension, Marketplace Downloader
Affected Systems
- OpenClaw AI Assistant Backend
- OpenClaw Ollama Extension
- OpenClaw Marketplace Plugin Downloader
-
OpenClaw: < v2026.3.31 (Fixed in:
v2026.3.31)
Code Analysis
Commit: 8deb952
Implementation of SSRF guard wrapper and hostname pinning for Ollama configuration.
export function buildOllamaBaseUrlSsrFPolicy(baseUrl: string): SsrFPolicy | undefined { ... }
Mitigation Strategies
- Upgrade OpenClaw application to version v2026.3.31 or later.
- Enforce strict egress network filtering on the host machine running OpenClaw.
- Implement IMDSv2 in AWS environments to require session tokens for metadata queries.
- Monitor outbound HTTP connections to RFC1918 IP addresses or the loopback interface.
Remediation Steps:
- Identify all deployed instances of OpenClaw prior to version v2026.3.31.
- Pull the latest Docker image or source release corresponding to v2026.3.31.
- Restart the OpenClaw service with the updated binaries.
- Review historical logs for suspicious Ollama baseUrl configurations or unauthorized marketplace plugin downloads.
References
Read the full report for GHSA-9Q7V-8MR7-G23P on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)