CVE-2026-27488: OpenClaw hardened cron webhook delivery against SSRF
(updated )
Affected Packages / Versions
openclawnpm package versions<= 2026.2.17.
Vulnerability
Cron webhook delivery in src/gateway/server-cron.ts used fetch() directly, so webhook targets could reach private/metadata/internal endpoints without SSRF policy checks.
Fix Commit(s)
99db4d13e35851cdaf
Thanks @Adam55A-code for reporting.
References
- github.com/advisories/GHSA-w45g-5746-x9fp
- github.com/openclaw/openclaw
- github.com/openclaw/openclaw/commit/99db4d13e5c139883ef0def9ff963e9273179655
- github.com/openclaw/openclaw/releases/tag/v2026.2.19
- github.com/openclaw/openclaw/security/advisories/GHSA-w45g-5746-x9fp
- nvd.nist.gov/vuln/detail/CVE-2026-27488
Code Behaviors & Features
Detect and mitigate CVE-2026-27488 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →