Severity:

HIGH RISK

(7.4)

Server-Side Request Forgery (CWE-918) via Incomplete IPv4 Special-Use Validation in OpenClaw

CVE-2026-32019

Published:

Mar 19, 2026

Status:

Undergoing Analysis

Summary

Affected Context

Exploit Preconditions

Why This Happens

Potential Impact

General Mitigation Guidance

How Teams Detect Issues Like This

Frequently Asked Questions

Source

NDV

Vulnerability Type

Vulnerability Type

Category:

Server-Side Request Forgery (SSRF)

CWE:

CWE-918

Impact:

Bypass of SSRF network access controls and unauthorized access to restricted network ranges

Severity:

HIGH RISK

(7.4)

CVSS Version:

3.1

Vulnerability Type

Category:

Server-Side Request Forgery (SSRF)

CWE:

CWE-918

Impact:

Bypass of SSRF network access controls and unauthorized access to restricted network ranges

Severity:

HIGH RISK

(7.4)

CVSS Version:

3.1

Catch This CVE While Code Is Being Written

Detect vulnerable code directly in pull requests, so CVEs are fixed before merge.