The vulnerability is a Server-Side Request Forgery (SSRF) weakness present in multiple functions across the OpenClaw codebase. The root cause was the direct use of the fetch API to make HTTP requests to user-provided URLs without proper validation. Attackers could supply URLs pointing to internal network resources (e.g., http://localhost, RFC1918 addresses), forcing the server to make requests to those endpoints.
The initial fix, commit 81c68f582d4a9a20d9cca9f367d2da9edc5a65ae, addressed the vulnerability in the primary media fetching and web fetching tools (fetchRemoteMedia, runWebFetch, fetchWithGuard). It introduced a centralized fetchWithSsrFGuard function that performs DNS pinning and blocks requests to private/internal IP addresses.
The second fix, commit 9bd64c8a1f91dda602afc1d5246a2ff2be164647, expanded this protection to other areas that were missed initially. This included the skill installation downloader (downloadFile) and several media transcription/description providers that used a shared fetchWithTimeout helper function. The patch replaced the vulnerable direct fetch calls with the new guarded implementation, effectively mitigating the SSRF risk across the application.