LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-28451

CVE-2026-28451 - Vulnerability Analysis

HighCVSS: 8.3

Last Updated: March 6, 2026

OpenClaw - Server Side Request Forgery

Published: March 5, 2026Updated: March 6, 2026Remote Exploitable

Overview

OpenClaw < 2026.2.14 contains a server-side request forgery caused by insufficient SSRF protections in the Feishu extension's sendMediaFeishu function and markdown image processing, letting attackers fetch attacker-controlled URLs and re-upload responses as media, exploit requires attacker to manipulate tool calls or prompt injection.

Severity & Score

Severity: High
CVSS Score: 8.3

Impact

Attackers can make unauthorized requests to internal services and re-upload responses, potentially leading to data exposure or further attacks.

Mitigation

Update to version 2026.2.14 or later.

Details

CVE ID
CVE-2026-28451
Severity
High
CVSS Score
8.3
Type
server_side_request_forgery
Status
new

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L