Description
OpenClaw before 2026.4.12 contains a server-side request forgery vulnerability in QQBot reply media URL handling that allows attackers to fetch arbitrary content. Attackers can exploit this by providing malicious media URLs that trigger SSRF requests, with fetched bytes subsequently re-uploaded through the channel.
Problem types
CWE-918 Server-Side Request Forgery (SSRF)
Product status
Any version before 2026.4.12
2026.4.12 (semver)
Credits
Yuki Shiroi (@threalwinky)
References
github.com/...enclaw/security/advisories/GHSA-2767-2q9v-9326 (GitHub Security Advisory (GHSA-2767-2q9v-9326))
github.com/...ommit/08ae021d1f4f02e0ca5fd8a3b9659291c1ecf95a (Patch Commit (1))
github.com/...ommit/ddb7a8dd80b8d5dd04aafa44ce7a4354b568bb2d (Patch Commit (2))
www.vulncheck.com/...gery-via-qqbot-reply-media-url-handling (VulnCheck Advisory: OpenClaw < 2026.4.12 - Server-Side Request Forgery via QQBot Reply Media URL Handling)