Untriaged
Permalink
CVE-2026-43526
8.2 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): LOW
- Availability impact (A): NONE
Activity log
- Created suggestion
OpenClaw < 2026.4.12 - Server-Side Request Forgery via QQBot Reply Media URL Handling
OpenClaw before 2026.4.12 contains a server-side request forgery vulnerability in QQBot reply media URL handling that allows attackers to fetch arbitrary content. Attackers can exploit this by providing malicious media URLs that trigger SSRF requests, with fetched bytes subsequently re-uploaded through the channel.
References
-
GitHub Security Advisory (GHSA-2767-2q9v-9326) vendor-advisory
-
Patch Commit (1) patch
-
Patch Commit (2) patch
Affected products
OpenClaw
- ==2026.4.12
- <2026.4.12
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>
-
@mkg20001 Maciej Krüger <mkg20001+nix@gmail.com>