The Feishu extension could fetch attacker-controlled remote URLs in two paths without SSRF protections:
sendMediaFeishu(mediaUrl)< 2026.2.14>= 2026.2.14If an attacker can influence tool calls (directly or via prompt injection), they may be able to trigger requests to internal services and re-upload the response as Feishu media.
Upgrade to OpenClaw 2026.2.14 or newer.
The fix routes Feishu remote media fetching through hardened runtime helpers that enforce SSRF policies and size limits.
{
"github_reviewed_at": "2026-02-18T17:45:12Z",
"severity": "HIGH",
"cwe_ids": [
"CWE-918"
],
"github_reviewed": true,
"nvd_published_at": null
}