CVE-2026-43526

HIGH

OpenClaw < 2026.4.12 - Server-Side Request Forgery via QQBot Reply Media URL Handling

Title source: cna
STIX 2.1

Description

OpenClaw before 2026.4.12 contains a server-side request forgery vulnerability in QQBot reply media URL handling that allows attackers to fetch arbitrary content. Attackers can exploit this by providing malicious media URLs that trigger SSRF requests, with fetched bytes subsequently re-uploaded through the channel.

References (4)

Core 4
Core References
Vendor Advisory vendor-advisory
GitHub Security Advisory (GHSA-2767-2q9v-9326)
https://github.com/openclaw/openclaw/security/advisories/GHSA-2767-2q9v-9326
Third Party Advisory third-party-advisory
VulnCheck Advisory: OpenClaw < 2026.4.12 - Server-Side Request Forgery via QQBot Reply Media URL Handling
https://www.vulncheck.com/advisories/openclaw-server-side-request-forgery-via-qqbot-reply-media-url-handling

Scores

CVSS v3 8.2
EPSS 0.0003
EPSS Percentile 9.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-918
Status published
Products (4)
npm/openclaw 0 - 2026.4.12npm
OpenClaw/OpenClaw < 2026.4.12
openclaw/openclaw < 2026.4.12
OpenClaw/OpenClaw 2026.4.12
Published May 05, 2026
Tracked Since May 05, 2026