Home

Description

OpenClaw before 2026.4.12 contains a server-side request forgery vulnerability in QQBot reply media URL handling that allows attackers to fetch arbitrary content. Attackers can exploit this by providing malicious media URLs that trigger SSRF requests, with fetched bytes subsequently re-uploaded through the channel.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-05 | Updated 2026-05-05 | Assigner VulnCheck




HIGH: 8.3CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N

HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

Problem types

CWE-918 Server-Side Request Forgery (SSRF)

Product status

Default status
unaffected

Any version before 2026.4.12
affected

2026.4.12 (semver)
unaffected

Credits

Yuki Shiroi (@threalwinky) reporter

References

github.com/...enclaw/security/advisories/GHSA-2767-2q9v-9326 (GitHub Security Advisory (GHSA-2767-2q9v-9326)) vendor-advisory

github.com/...ommit/08ae021d1f4f02e0ca5fd8a3b9659291c1ecf95a (Patch Commit (1)) patch

github.com/...ommit/ddb7a8dd80b8d5dd04aafa44ce7a4354b568bb2d (Patch Commit (2)) patch

www.vulncheck.com/...gery-via-qqbot-reply-media-url-handling (VulnCheck Advisory: OpenClaw < 2026.4.12 - Server-Side Request Forgery via QQBot Reply Media URL Handling) third-party-advisory

cve.org (CVE-2026-43526)

nvd.nist.gov (CVE-2026-43526)

Download JSON