CVE-2026-28476 - Vulnerability Analysis
HighCVSS: 8.3Last Updated: March 6, 2026
OpenClaw - Server-Side Request Forgery
Published: March 5, 2026Updated: March 6, 2026Remote Exploitable
Overview
OpenClaw < 2026.2.14 contains a server-side request forgery caused by improper validation of user-provided base URLs in the Tlon Urbit extension, letting attackers induce HTTP requests to arbitrary hosts, exploit requires attacker to influence the configured Urbit URL.
Severity & Score
Severity: High
CVSS Score: 8.3
Impact
Attackers can make the server send HTTP requests to arbitrary or internal hosts, potentially accessing internal resources or services.
Mitigation
Update to version 2026.2.14 or later.
References
Related Resources
Details
- CVE ID
- CVE-2026-28476
- Severity
- High
- CVSS Score
- 8.3
- Type
- server_side_request_forgery
- Status
- new
CWE
- CWE-918
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L