<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-28476 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-28476/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 29 Mar 2026 15:49:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-28476/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw SSRF Vulnerability via Unguarded Configured Base URLs</title><link>https://feed.craftedsignal.io/briefs/2026-05-openclaw-ssrf/</link><pubDate>Sun, 29 Mar 2026 15:49:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-openclaw-ssrf/</guid><description>OpenClaw versions 2026.3.24 and earlier are vulnerable to Server-Side Request Forgery (SSRF) because of unguarded configured base URLs in multiple channel extensions, allowing attackers to potentially access internal resources.</description><content:encoded><![CDATA[<p>The <code>openclaw</code> package, a Node.js module, contains a Server-Side Request Forgery (SSRF) vulnerability in versions 2026.3.24 and earlier. This flaw stems from an incomplete fix for CVE-2026-28476, where several channel extensions continued to use raw <code>fetch()</code> against configured base URLs without proper SSRF protection. This omission allows attackers to potentially manipulate configured endpoints to target blocked internal destinations, bypassing intended security measures. The vulnerability was identified and patched in version 2026.3.25 through commit <code>f92c92515bd439a71bd03eb1bc969c1964f17acf</code>, which routes outbound requests through <code>fetchWithSsrFGuard</code>. Defenders should ensure they are running version 2026.3.25 or later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an <code>openclaw</code> instance running version 2026.3.24 or earlier.</li>
<li>The attacker identifies a channel extension that uses a configured base URL.</li>
<li>Attacker crafts a malicious configuration that redirects the base URL to an internal resource.</li>
<li>The vulnerable <code>fetch()</code> function in the channel extension makes an HTTP request to the attacker-controlled URL.</li>
<li>The request bypasses the SSRF guard due to the incomplete fix for CVE-2026-28476.</li>
<li>The targeted internal resource processes the attacker&rsquo;s request.</li>
<li>Sensitive information from the internal resource is potentially exposed to the attacker.</li>
<li>Attacker exfiltrates the exposed information, completing the SSRF attack.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability could allow an attacker to gain unauthorized access to internal resources and sensitive information. The number of potential victims is dependent on the prevalence of vulnerable <code>openclaw</code> instances. If successful, the attacker can read internal files, access internal services, or even potentially execute commands on internal systems, leading to data breaches or further compromise of the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>openclaw</code> package to version 2026.3.25 or later to incorporate the fix for CVE-2026-28476, as described in the overview.</li>
<li>Implement network segmentation to limit the impact of potential SSRF vulnerabilities by restricting access from the affected systems to sensitive internal resources.</li>
<li>Deploy the Sigma rule &ldquo;Detect OpenClaw SSRF Vulnerable Versions&rdquo; to identify potentially vulnerable instances of the <code>openclaw</code> package based on user-agent strings.</li>
<li>Monitor outbound network connections from <code>openclaw</code> instances for connections to internal IP addresses or unexpected domains, which could indicate SSRF exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>openclaw</category><category>cve-2026-28476</category></item></channel></rss>