Skip to content
CVSS 8.2 · HIGH

CVE-2026-43526

OpenClaw before 2026.4.12 contains a server-side request forgery vulnerability in QQBot reply media URL handling that allows attackers to fetch arbitrary content. Attackers can exploit this by providing malicious media URLs that trigger SSRF requests, with fetched bytes subsequently re-uploaded through the channel.

Ver en NVD

Análisis

OpenClaw is a niche bot/server project, and the vulnerability specifically impacts QQBot integration, which is popular in the Chinese ecosystem but rare in the Mexican developer community. Despite the high CVSS score, the product lacks the widespread deployment needed for a general alert.

Severidad

Puntaje: 8.2(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: LOW
A: NONE
Tipo de falla (CWE): CWE-918

EPSS

Probabilidad de explotación (próx. 30 días): 0.0003 (0.0%)
Percentil: 8.4%
EPSS: 2026-05-06

Afecta

openclaw:openclaw

Descripción técnica

OpenClaw before 2026.4.12 contains a server-side request forgery vulnerability in QQBot reply media URL handling that allows attackers to fetch arbitrary content. Attackers can exploit this by providing malicious media URLs that trigger SSRF requests, with fetched bytes subsequently re-uploaded through the channel.

Publicada: 5/5/2026, 12:16:18
Última modificación: 7/5/2026, 1:57:11

Referencias

InicioEventosBlogRecursosEquipo