Impact
The vulnerability is a server‑side request forgery that occurs in the QQBot media upload feature of OpenClaw. By sending specifically crafted image URLs to the uploadC2CMedia and uploadGroupMedia endpoints, an attacker can bypass the application's URL validation and cause the server to make arbitrary HTTP requests on the attacker’s behalf. This allows exploitation of internal resources, exposure of sensitive data, or further lateral movement, which constitutes a confidentiality, integrity, and availability risk.
Affected Systems
The flaw affects OpenClaw version numbers earlier than 2026.4.20. Administrators running any pre‑2026.4.20 build of the OpenClaw platform are potentially vulnerable when using the QQBot direct media upload functionality.
Risk and Exploitability
The CVSS score of 6.3 indicates a moderate severity risk. The EPSS score is not available, and the vulnerability is not currently listed in CISA’s KEV catalog. Attackers are likely to target this issue by submitting malicious URLs to the vulnerable endpoints; the attack requires only web access to the application and does not require complex prerequisites, so the likelihood of exploitation is considered moderate.
OpenCVE Enrichment