CVE-2026-6011: OpenClaw: SSRF via web-fetch enables internal network pivot
GHSA-52vj-fvrv-7q82 MEDIUMCVE-2026-6011 is a Server-Side Request Forgery flaw in OpenClaw's assertPublicHostname handler (src/agents/tools/web-fetch.ts) that allows unauthenticated remote attackers to force the AI agent to issue arbitrary HTTP requests to internal or restricted network resources. Although the CVSS score of 5.6 (Medium) reflects high attack complexity, the public availability of exploit code combined with the AI agent context substantially elevates real-world risk — a successful exploit can pivot to cloud metadata services (e.g., AWS IMDSv1 at 169.254.169.254), internal APIs, or services behind network segmentation, yielding temporary IAM credentials or internal service data. This package carries 67 tracked CVEs, indicating a systemic security posture problem that should factor into your supply chain risk assessment. Upgrade to openclaw 2026.1.29 immediately; if patching is delayed, enforce strict infrastructure-level egress controls blocking agent access to RFC-1918 addresses and cloud metadata endpoints.
Risk Assessment
Medium severity by CVSS, but elevated to HIGH in environments where OpenClaw agents operate with unrestricted outbound network access. The AC:H score mitigates casual exploitation, but the public exploit removes the obscurity buffer. SSRF in AI agent tooling is particularly dangerous because agents may execute tool calls autonomously and at scale — a single malicious prompt can trigger repeated internal probing. Cloud-hosted deployments are at the greatest risk due to accessible IMDS endpoints. The 67 prior CVEs in this package suggest insufficient security investment by the maintainer and warrants treating openclaw as a high-risk dependency.
Attack Kill Chain
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| openclaw | npm | < 2026.1.29 | 2026.1.29 |
Do you use openclaw? You're affected.
Severity & Risk
Attack Surface
Recommended Action
- Upgrade openclaw to version 2026.1.29 (commit b623557a2ec7e271bda003eb3ac33fbb2e218505).
- If patching is delayed, enforce egress firewall rules blocking agent processes from reaching 169.254.169.254, 100.64.0.0/10, and all RFC-1918 ranges (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16).
- Enable IMDSv2 (token-required mode) on all AWS EC2 instances hosting OpenClaw agents.
- Audit agent tool invocation logs for URL patterns targeting private address spaces, localhost variants, or cloud metadata paths.
- Apply least-privilege network policies to agent runtime containers — deny all egress except explicitly allowlisted external domains.
Classification
Compliance Impact
This CVE is relevant to:
Related AI Incidents (1)
Source: AI Incident Database (AIID)
Frequently Asked Questions
What is CVE-2026-6011?
CVE-2026-6011 is a Server-Side Request Forgery flaw in OpenClaw's assertPublicHostname handler (src/agents/tools/web-fetch.ts) that allows unauthenticated remote attackers to force the AI agent to issue arbitrary HTTP requests to internal or restricted network resources. Although the CVSS score of 5.6 (Medium) reflects high attack complexity, the public availability of exploit code combined with the AI agent context substantially elevates real-world risk — a successful exploit can pivot to cloud metadata services (e.g., AWS IMDSv1 at 169.254.169.254), internal APIs, or services behind network segmentation, yielding temporary IAM credentials or internal service data. This package carries 67 tracked CVEs, indicating a systemic security posture problem that should factor into your supply chain risk assessment. Upgrade to openclaw 2026.1.29 immediately; if patching is delayed, enforce strict infrastructure-level egress controls blocking agent access to RFC-1918 addresses and cloud metadata endpoints.
Is CVE-2026-6011 actively exploited?
No confirmed active exploitation of CVE-2026-6011 has been reported, but organizations should still patch proactively.
How to fix CVE-2026-6011?
1. Upgrade openclaw to version 2026.1.29 (commit b623557a2ec7e271bda003eb3ac33fbb2e218505). 2. If patching is delayed, enforce egress firewall rules blocking agent processes from reaching 169.254.169.254, 100.64.0.0/10, and all RFC-1918 ranges (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16). 3. Enable IMDSv2 (token-required mode) on all AWS EC2 instances hosting OpenClaw agents. 4. Audit agent tool invocation logs for URL patterns targeting private address spaces, localhost variants, or cloud metadata paths. 5. Apply least-privilege network policies to agent runtime containers — deny all egress except explicitly allowlisted external domains.
What systems are affected by CVE-2026-6011?
This vulnerability affects the following AI/ML architecture patterns: agent frameworks, AI systems with web browsing capabilities, RAG pipelines with URL fetching, cloud-hosted AI services.
What is the CVSS score for CVE-2026-6011?
CVE-2026-6011 has a CVSS v3.1 base score of 5.6 (MEDIUM).
Technical Details
NVD Description
A weakness has been identified in OpenClaw up to 2026.1.26. Affected by this issue is some unknown functionality of the file src/agents/tools/web-fetch.ts of the component assertPublicHostname Handler. Executing a manipulation can lead to server-side request forgery. The attack can be executed remotely. This attack is characterized by high complexity. The exploitation is known to be difficult. The exploit has been made available to the public and could be used for attacks. Upgrading to version 2026.1.29 can resolve this issue. This patch is called b623557a2ec7e271bda003eb3ac33fbb2e218505. Upgrading the affected component is advised.
Exploitation Scenario
An adversary with the ability to influence OpenClaw agent inputs — via direct user access, a prompt injection embedded in a document ingested by a RAG pipeline, or indirect injection through retrieved web content — crafts a request containing a URL targeting http://169.254.169.254/latest/meta-data/iam/security-credentials/. The flawed assertPublicHostname handler fails to reject this address, and the web-fetch tool fetches the resource. The agent returns the cloud IAM temporary credentials (Access Key, Secret Key, Session Token) in its response, which the adversary harvests and uses to assume the instance's IAM role. This is especially realistic in agentic workflows where user-supplied URLs are passed directly to the fetch tool without secondary validation.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L References
- github.com/advisories/GHSA-52vj-fvrv-7q82
- github.com/openclaw/openclaw
- github.com/openclaw/openclaw/commit/b623557a2ec7e271bda003eb3ac33fbb2e218505
- github.com/openclaw/openclaw/releases/tag/v2026.1.29
- github.com/zast-ai/vulnerability-reports/blob/main/openclaw/ssrf.md
- nvd.nist.gov/vuln/detail/CVE-2026-6011
- vuldb.com/submit/795224
- vuldb.com/vuln/356567
- vuldb.com/vuln/356567/cti
Timeline
Related Vulnerabilities
CVE-2026-30741 9.8 OpenClaw: RCE via request-side prompt injection
Same package: openclaw CVE-2026-28451 9.3 OpenClaw: SSRF via Feishu extension exposes internal services
Same package: openclaw GHSA-m3mh-3mpg-37hw 8.6 OpenClaw: .npmrc hijack enables RCE on plugin install
Same package: openclaw CVE-2026-27001 7.8 OpenClaw: prompt injection via unsanitized workspace path
Same package: openclaw GHSA-hr5v-j9h9-xjhg 7.7 OpenClaw: sandbox escape via mediaUrl path traversal
Same package: openclaw
AI Threat Alert