| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-x22m-j5qq-j49m | OpenClaw has two SSRF via sendMediaFeishu and markdown image fetching in Feishu extension |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 06 Mar 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-918 |
Fri, 06 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 05 Mar 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.2.14 contain server-side request forgery vulnerabilities in the Feishu extension that allow attackers to fetch attacker-controlled remote URLs without SSRF protections via sendMediaFeishu function and markdown image processing. Attackers can influence tool calls through direct manipulation or prompt injection to trigger requests to internal services and re-upload responses as Feishu media. | |
| Title | OpenClaw < 2026.2.14 - SSRF via Feishu Extension Media Fetching | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-918 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-06T16:31:29.113Z
Reserved: 2026-02-27T19:17:03.738Z
Link: CVE-2026-28451
No data.
Status : Received
Published: 2026-03-05T22:16:17.210
Modified: 2026-03-06T17:16:29.100
Link: CVE-2026-28451
No data.
OpenCVE Enrichment
Updated: 2026-03-06T15:00:32Z
No weakness.
Github GHSA