The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-22181

CVE-2026-22181: OpenClaw DNS Pinning SSRF Vulnerability

CVE-2026-22181 is a DNS pinning bypass vulnerability in OpenClaw that allows SSRF attacks when proxy environment variables are set. This article covers the technical details, affected versions, impact, and mitigation.

Published: March 20, 2026

CVE-2026-22181 Overview

OpenClaw versions prior to 2026.3.2 contain a DNS pinning bypass vulnerability (CWE-918: Server-Side Request Forgery) in strict URL fetch paths that allows attackers to circumvent SSRF guards when environment proxy variables are configured. When HTTP_PROXY, HTTPS_PROXY, or ALL_PROXY environment variables are present, attacker-influenced URLs can be routed through proxy behavior instead of pinned-destination routing, enabling access to internal targets reachable from the proxy environment.

Critical Impact

Attackers can bypass DNS pinning protections designed to prevent SSRF attacks, potentially gaining unauthorized access to internal services, cloud metadata endpoints, and other sensitive resources reachable from the proxy environment.

Affected Products

  • OpenClaw versions prior to 2026.3.2
  • Deployments with HTTP_PROXY, HTTPS_PROXY, or ALL_PROXY environment variables configured
  • Web fetch functionality in environments utilizing proxy configurations

Discovery Timeline

  • 2026-03-18 - CVE-2026-22181 published to NVD
  • 2026-03-18 - Last updated in NVD database

Technical Details for CVE-2026-22181

Vulnerability Analysis

This vulnerability represents a Server-Side Request Forgery (SSRF) guard bypass that affects OpenClaw's URL fetch functionality. The issue stems from an incomplete implementation of DNS pinning protections that fails to account for proxy environment variable configurations.

DNS pinning is a security mechanism designed to prevent SSRF attacks by resolving domain names and then ensuring all subsequent connections are made to the initially resolved IP address. This prevents attackers from using DNS rebinding or other techniques to redirect requests to internal resources.

However, when proxy environment variables (HTTP_PROXY, HTTPS_PROXY, or ALL_PROXY) are configured in the deployment environment, the DNS pinning mechanism is effectively bypassed. Instead of connecting directly to the pinned IP address, requests are routed through the configured proxy server, which performs its own DNS resolution and connection handling.

Root Cause

The root cause is an architectural oversight in OpenClaw's URL fetch implementation. The DNS pinning logic was implemented at the application layer but did not account for the lower-level HTTP client behavior when proxy environment variables are present. When a proxy is configured, the HTTP client delegates connection establishment to the proxy server, completely bypassing the application's DNS pinning checks.

This creates a scenario where:

  1. The application resolves a hostname and pins the IP address
  2. The application attempts to connect to the pinned IP
  3. The HTTP client intercepts the request due to proxy configuration
  4. The request is forwarded to the proxy server with the original hostname
  5. The proxy performs its own DNS resolution and connects to any address that hostname resolves to

Attack Vector

An attacker can exploit this vulnerability through network-accessible URL fetch functionality in OpenClaw. The attack requires that the target deployment has proxy environment variables configured.

The exploitation flow involves providing a malicious URL to OpenClaw's web fetch functionality. The attacker controls a DNS server that initially resolves to a benign IP (passing any initial validation), but the proxy server may resolve the domain to a different address, or the attacker can leverage DNS rebinding techniques since the proxy performs independent resolution.

This allows attackers to access internal services such as cloud metadata endpoints (e.g., 169.254.169.254), internal APIs, databases, and other resources that should be protected by SSRF guards. For detailed technical implementation, refer to the GitHub Security Advisory GHSA-8mvx-p2r9-r375.

Detection Methods for CVE-2026-22181

Indicators of Compromise

  • Unusual outbound requests from OpenClaw instances to internal IP ranges (e.g., 10.x.x.x, 172.16.x.x, 192.168.x.x, 169.254.x.x)
  • HTTP requests to cloud metadata endpoints (e.g., 169.254.169.254) originating from OpenClaw processes
  • Proxy logs showing requests to internal hostnames or IP addresses initiated by OpenClaw
  • DNS resolution anomalies where the same domain resolves to different IPs across application and proxy layers

Detection Strategies

  • Monitor proxy server logs for requests to internal IP ranges or sensitive endpoints that originate from OpenClaw services
  • Implement network segmentation monitoring to detect unexpected internal traffic patterns from web-facing OpenClaw deployments
  • Configure alerts for requests to known cloud metadata IP addresses (169.254.169.254, fd00:ec2::254)
  • Review application logs for URL fetch operations targeting suspicious or internal destinations

Monitoring Recommendations

  • Enable detailed logging for all URL fetch operations in OpenClaw to capture full request URLs and destinations
  • Configure proxy servers to log source application identifiers alongside request details
  • Implement egress filtering with logging to detect attempts to reach internal networks from OpenClaw instances
  • Set up anomaly detection for unusual patterns in outbound request frequency or destination diversity

How to Mitigate CVE-2026-22181

Immediate Actions Required

  • Upgrade OpenClaw to version 2026.3.2 or later, which contains the fix for this vulnerability
  • Audit current deployments to identify instances where proxy environment variables are configured
  • Review and restrict access to internal services from systems running vulnerable OpenClaw versions
  • Implement network-level SSRF protections as a defense-in-depth measure

Patch Information

The vulnerability has been addressed in OpenClaw version 2026.3.2. The fix ensures that DNS pinning protections are enforced regardless of proxy configuration by implementing pinning at a layer that cannot be bypassed by HTTP client proxy behavior. For technical details on the patch implementation, see the GitHub Commit Update.

Additional information is available in the VulnCheck Advisory on DNS Pinning Bypass.

Workarounds

  • Remove or unset HTTP_PROXY, HTTPS_PROXY, and ALL_PROXY environment variables from OpenClaw deployment environments if proxy usage is not required
  • Implement network-level egress filtering to block requests to internal IP ranges from OpenClaw instances
  • Deploy a dedicated proxy server with strict allowlists that prevent access to internal resources
  • Use network segmentation to isolate OpenClaw instances from sensitive internal services
bash
# Configuration example
# Unset proxy environment variables for OpenClaw service
unset HTTP_PROXY
unset HTTPS_PROXY
unset ALL_PROXY
unset http_proxy
unset https_proxy
unset all_proxy

# Alternative: Configure OpenClaw service without proxy inheritance
# In systemd service file, add:
# Environment="HTTP_PROXY="
# Environment="HTTPS_PROXY="
# Environment="ALL_PROXY="

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeSSRF

  • Vendor/TechOpenclaw

  • SeverityMEDIUM

  • CVSS Score6.1

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-918
  • Technical References
  • GitHub Commit Update

  • GitHub Security Advisory GHSA-8mvx-p2r9-r375

  • VulnCheck Advisory on DNS Pinning Bypass
  • Related CVEs
  • CVE-2026-34504: Openclaw SSRF Vulnerability

  • CVE-2026-32913: Openclaw SSRF Vulnerability

  • CVE-2026-31989: Openclaw SSRF Vulnerability

  • CVE-2026-28476: OpenClaw SSRF Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English