CVE-2026-43526
HIGHOpenClaw < 2026.4.12 - Server-Side Request Forgery via QQBot Reply Media URL Handling
Title source: cnaDescription
OpenClaw before 2026.4.12 contains a server-side request forgery vulnerability in QQBot reply media URL handling that allows attackers to fetch arbitrary content. Attackers can exploit this by providing malicious media URLs that trigger SSRF requests, with fetched bytes subsequently re-uploaded through the channel.
References (4)
Core 4
Core References
Vendor Advisory vendor-advisory
GitHub Security Advisory (GHSA-2767-2q9v-9326)
https://github.com/openclaw/openclaw/security/advisories/GHSA-2767-2q9v-9326
Patch patch
Patch Commit (1)
https://github.com/openclaw/openclaw/commit/08ae021d1f4f02e0ca5fd8a3b9659291c1ecf95a
Patch patch
Patch Commit (2)
https://github.com/openclaw/openclaw/commit/ddb7a8dd80b8d5dd04aafa44ce7a4354b568bb2d
Third Party Advisory third-party-advisory
VulnCheck Advisory: OpenClaw < 2026.4.12 - Server-Side Request Forgery via QQBot Reply Media URL Handling
https://www.vulncheck.com/advisories/openclaw-server-side-request-forgery-via-qqbot-reply-media-url-handling
Scores
CVSS v3
8.2
EPSS
0.0003
EPSS Percentile
9.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-918
Status
published
Products (4)
npm/openclaw
0 - 2026.4.12npm
OpenClaw/OpenClaw
< 2026.4.12
openclaw/openclaw
< 2026.4.12
OpenClaw/OpenClaw
2026.4.12
Published
May 05, 2026
Tracked Since
May 05, 2026