Impact
OpenClaw versions before 2026.4.12 contain a server‑side request forgery that allows an attacker to embed a malicious media URL in a QQBot reply. The application follows the URL, fetches the content, and re‑uploads it, giving the attacker the ability to retrieve arbitrary web resources and potentially embed them in the system. This flaw can be used to obtain sensitive data from internal networks, with a single authenticated or unauthenticated request, depending on the QQBot configuration.
Affected Systems
OpenClaw is the affected vendor and product. Versions older than 2026.4.12 of OpenClaw are vulnerable.
Risk and Exploitability
The vulnerability has a CVSS score of 8.3, indicating high severity. No EPSS score is available, but the flaw’s mechanics are straightforward, making it likely to be exploited if a QQBot channel is exposed to untrusted users. The flaw is not listed in the CISA KEV catalog. Attackers can trigger the SSRF by submitting a crafted media URL through the QQBot reply interface; the server then fetches content and re‑uploads it, potentially exposing the application to arbitrary network access.
OpenCVE Enrichment
Github GHSA