Description
OpenClaw before 2026.4.22 contains a server-side request forgery vulnerability in the Zalo plugin's sendPhoto function that fails to validate outbound photo URLs through the SSRF guard. Attackers can bypass SSRF protection by providing malicious photo URLs to the Zalo Bot API, enabling unauthorized access to internal resources.
Published: 2026-05-06
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

OpenClaw releases prior to 2026.4.22 contain a server‑side request forgery in the Zalo plugin’s sendPhoto method. The function does not validate outbound photo URLs against the configured SSRF guard, allowing any attacker who can invoke the Zalo Bot API to supply a malicious URL. This flaw gives an attacker the ability to force the server to perform requests to arbitrary internal resources, exposing data or enabling further footholds. The weakness is the same that is identified in CWE‑918, which governs unsafe requests from an application to an arbitrary host.

Affected Systems

Affected products are the OpenClaw chatbot framework, specifically all installations older than the 2026.4.22 release. Any deployment that uses the Zalo plugin and has the sendPhoto capability enabled before that version is vulnerable. The CPE indicates that the issue exists in node.js environments running OpenClaw. No patch versions are provided in the advisory; users should migrate to 2026.4.22 or later.

Risk and Exploitability

The CVSS score of 6.9 marks the vulnerability as moderate, and the EPSS score is not available, so the exact likelihood of exploitation cannot be quantified – the attack vector is likely through the public API exposed by the Zalo bot. Because the flaw allows arbitrary outbound connections, attackers can reach internal systems that are otherwise protected by network segmentation. The vulnerability is not yet listed in the CISA KEV catalog, and no public exploits have been reported, but the nature of SSRF suggests that an attacker could use it to pivot into the internal network or exfiltrate sensitive data.

Generated by OpenCVE AI on May 6, 2026 at 21:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.4.22 or newer, which includes validation of the photo URLs.
  • If an upgrade cannot be performed immediately, disable the Zalo sendPhoto feature or restrict the photo URL parameter to only allow trusted domain hosts.
  • Apply network segmentation or firewall rules that block outbound traffic from the OpenClaw instance to untrusted internal hosts, limiting the impact of any remaining SSRF activity.

Generated by OpenCVE AI on May 6, 2026 at 21:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 06 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.4.22 contains a server-side request forgery vulnerability in the Zalo plugin's sendPhoto function that fails to validate outbound photo URLs through the SSRF guard. Attackers can bypass SSRF protection by providing malicious photo URLs to the Zalo Bot API, enabling unauthorized access to internal resources.
Title OpenClaw < 2026.4.22 - Server-Side Request Forgery in Zalo Photo URL Validation
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-918
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:H/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-07T13:59:13.862Z

Reserved: 2026-05-05T11:30:46.259Z

Link: CVE-2026-44116

cve-icon Vulnrichment

Updated: 2026-05-07T13:59:08.007Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T20:16:35.637

Modified: 2026-05-06T21:20:52.707

Link: CVE-2026-44116

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T23:15:17Z

Weaknesses