CVE-2026-31989 Overview
OpenClaw versions prior to 2026.3.1 contain a server-side request forgery (SSRF) vulnerability in the web_search citation redirect resolution component. The vulnerability exists because the application uses a private-network-allowing SSRF policy when processing citation redirects. An attacker who can influence citation redirect targets can trigger internal-network requests from the OpenClaw host to loopback, private, or internal destinations, potentially exposing sensitive internal services and resources.
Critical Impact
Attackers can leverage this SSRF vulnerability to make the OpenClaw server initiate requests to internal network resources, including loopback addresses and private network destinations, bypassing network segmentation controls.
Affected Products
- OpenClaw versions prior to 2026.3.1
- OpenClaw for Node.js (all affected versions)
Discovery Timeline
- 2026-03-19 - CVE-2026-31989 published to NVD
- 2026-03-19 - Last updated in NVD database
Technical Details for CVE-2026-31989
Vulnerability Analysis
This vulnerability is classified as CWE-918 (Server-Side Request Forgery). The flaw resides in how OpenClaw handles citation redirect resolution within its web_search functionality. When processing citations, the application follows redirects without adequately restricting the destination addresses, allowing requests to internal network resources.
The permissive SSRF policy enables attackers to craft malicious citation URLs that redirect to internal endpoints. When OpenClaw processes these citations, the server-side component follows the redirect and makes requests to destinations that should be inaccessible from external sources, including loopback interfaces (127.0.0.1, localhost), private IP ranges (10.x.x.x, 172.16.x.x-172.31.x.x, 192.168.x.x), and other internal network destinations.
Root Cause
The root cause of this vulnerability is the implementation of an overly permissive SSRF policy in the citation redirect resolution mechanism. The web_search component does not properly validate or restrict redirect destinations, allowing redirects to private network addresses. This design flaw permits external input to influence internal network requests, violating the principle of network segmentation.
Attack Vector
The attack vector is network-based and requires low privileges to exploit. An attacker must be able to influence citation redirect targets, either by controlling a citation source or by manipulating citation data that OpenClaw processes. The exploitation flow involves:
- The attacker crafts or controls a citation URL that issues an HTTP redirect to an internal network destination
- When OpenClaw's web_search functionality processes this citation, it follows the redirect
- The OpenClaw server makes an HTTP request to the internal destination specified in the redirect
- The attacker may receive response data or side-channel information about internal services
The vulnerability can be exploited to probe internal network services, access internal APIs, retrieve metadata from cloud environments, or potentially bypass authentication mechanisms that trust internal network sources.
Detection Methods for CVE-2026-31989
Indicators of Compromise
- Unusual outbound HTTP requests from the OpenClaw server to internal IP addresses (loopback, RFC 1918 ranges)
- Citation processing logs showing redirects to private network destinations
- Network traffic anomalies where the OpenClaw host connects to unexpected internal services
- Requests to cloud metadata endpoints (e.g., 169.254.169.254) originating from the OpenClaw application
Detection Strategies
- Monitor network traffic from OpenClaw servers for connections to internal IP ranges and loopback addresses
- Implement egress filtering rules and alert on violations from the OpenClaw application tier
- Review application logs for citation URLs containing internal network addresses or localhost references
- Deploy web application firewall (WAF) rules to detect SSRF patterns in citation-related requests
Monitoring Recommendations
- Enable detailed logging for the web_search citation resolution component
- Configure network monitoring to alert on OpenClaw connections to non-public IP ranges
- Implement cloud provider metadata service blocking and monitor for bypass attempts
- Set up alerts for unusual DNS resolution patterns from the OpenClaw server
How to Mitigate CVE-2026-31989
Immediate Actions Required
- Upgrade OpenClaw to version 2026.3.1 or later immediately
- Review network segmentation to limit the impact of potential SSRF exploitation
- Implement egress filtering to restrict outbound connections from the OpenClaw server
- Audit citation sources and redirect chains for suspicious destinations
Patch Information
The vulnerability has been addressed in OpenClaw version 2026.3.1. Organizations should upgrade to this version or later to remediate the SSRF vulnerability. For detailed patch information and upgrade instructions, refer to the GitHub Security Advisory GHSA-g99v-8hwm-g76g.
Additional technical details are available in the VulnCheck SSRF Advisory.
Workarounds
- Deploy network-level controls to block outbound requests from the OpenClaw server to private IP ranges and loopback addresses
- Configure reverse proxy or WAF rules to filter requests containing internal network destinations in citation URLs
- Implement application-level URL validation to reject redirects to non-public IP addresses before processing citations
- Consider temporarily disabling the web_search citation feature if immediate patching is not feasible
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


