Description
OpenClaw before 2026.4.8 contains a server-side request forgery vulnerability in QQ Bot media download paths that bypass SSRF protection. Attackers can exploit unprotected media fetch endpoints to access internal resources and bypass allowlist policies.
Published: 2026-04-28
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: Unrestricted internal resource access via SSRF
Action: Immediate Patch
AI Analysis

Impact

The flaw is a server‑side request forgery that allows attackers to force the OpenClaw application to make outbound HTTP requests through its media fetch endpoints. By constructing malicious URLs, the attacker can bypass the built‑in SSRF protection and reach any internal server exposed to the application’s network, potentially leaking sensitive data or executing further attacks. The weakness is identified as CWE‑918 and carries a CVSS score of 5.1, indicating a medium severity if exploited. The vulnerability does not require local user privileges; it is driven by an attacker interacting with the QQ Bot interface. Affected systems: The OpenClaw platform, versions earlier than 2026.4.8, is impacted. The product is distributed under the OpenClaw:OpenClaw banner and is deployed on Node.js environments. Risk and exploitability: With a CVSS of 5.1 and no EPSS availability, the likelihood of exploitation is uncertain but the potential for internal compromise is significant. The vulnerability is not listed in the CISA KEV catalog. Attackers can trigger the SSRF by sending specially crafted media fetch requests to the QQ Bot endpoint, and the application will resolve the URL without validating the destination, enabling access to any internal resource reachable from the host. The absence of an allowlist and the ability to target arbitrary URLs makes this a classic SSRF scenario.

Affected Systems

The OpenClaw platform, versions earlier than 2026.4.8, running on Node.js environments, is affected.

Risk and Exploitability

The CVSS score of 5.1 indicates medium severity, while the EPSS score is not available and the vulnerability is not in the CISA KEV catalog. The flaw is exploitable by sending crafted media fetch requests to the QQ Bot endpoint, enabling the attacker to reach internal resources that are otherwise protected by allowlist policies. The ability to bypass SSRF checks makes the risk of internal data exposure high if the application is reachable.

Generated by OpenCVE AI on April 28, 2026 at 22:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update OpenClaw to version 2026.4.8 or later, which removes the SSRF flaw in media fetch paths.
  • Configure the application’s outbound network settings to restrict HTTP requests to approved domains only, ensuring that untrusted URLs cannot be resolved.
  • If immediate patching is unavailable, implement an additional layer of validation on the media fetch input to enforce allowlisting of target hosts and reject requests that attempt to bypass the SSRF protection.

Generated by OpenCVE AI on April 28, 2026 at 22:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.4.8 contains a server-side request forgery vulnerability in QQ Bot media download paths that bypass SSRF protection. Attackers can exploit unprotected media fetch endpoints to access internal resources and bypass allowlist policies.
Title OpenClaw < 2026.4.8 - Server-Side Request Forgery in QQ Bot Media Fetch Paths
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-918
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:L/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-28T18:10:09.468Z

Reserved: 2026-04-22T15:20:49.859Z

Link: CVE-2026-41914

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-28T19:37:45.243

Modified: 2026-04-28T20:10:23.367

Link: CVE-2026-41914

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T23:00:13Z

Weaknesses