In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.
Start learningUpgrade openclaw to version 2026.2.22 or higher.
openclaw is a 🦞 OpenClaw — Personal AI Assistant
Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) incomplete validation of IPv4 special-use address ranges in the web_fetch process. An attacker can access internal or non-global network resources by supplying crafted URLs that bypass SSRF protections. This is only exploitable if the attacker has network reachability to the relevant special-use ranges and can trigger a request path that reaches web_fetch URL fetching.