GHSA-g99v-8hwm-g76g

Suggest an improvement
Source
https://github.com/advisories/GHSA-g99v-8hwm-g76g
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-g99v-8hwm-g76g/GHSA-g99v-8hwm-g76g.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-g99v-8hwm-g76g
Aliases
  • CVE-2026-31989
Downstream
Published
2026-03-02T22:03:09Z
Modified
2026-03-20T21:59:07.679598Z
Severity
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
OpenClaw has web_search citation redirect SSRF via private-network-allowing policy
Details

Summary

Gemini web_search citation redirect resolution used a private-network-allowing SSRF policy. A citation URL redirect could target loopback/private/internal destinations and be fetched by the gateway.

Impact

An attacker who can influence citation redirect targets could trigger internal-network requests from the OpenClaw host.

Fix

Citation redirect resolution now uses strict/default SSRF policy (no private-network override), blocking localhost/private/internal redirect targets.

Affected and Patched Versions

  • Affected: <= 2026.2.26
  • Patched: 2026.3.1
Database specific
{
    "nvd_published_at": null,
    "github_reviewed_at": "2026-03-02T22:03:09Z",
    "cwe_ids": [
        "CWE-918"
    ],
    "severity": "HIGH",
    "github_reviewed": true
}
References

Affected packages

npm / openclaw

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2026.3.1

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-g99v-8hwm-g76g/GHSA-g99v-8hwm-g76g.json"