CVE-2026-44116
OpenClaw before 2026.4.22 contains a server-side request forgery vulnerability in the Zalo plugin's sendPhoto function that fails to validate outbound photo URLs through the SSRF guard. Attackers can bypass SSRF protection by providing malicious photo URLs to the Zalo Bot API, enabling unauthorized access to internal resources.
Ver en NVDAnálisis
The vulnerability affects OpenClaw, a niche project, specifically within its Zalo messaging plugin. Since Zalo is not widely used in the Mexican market and the software itself has limited deployment in standard dev stacks, it does not warrant an alert for the community.
Severidad
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:NCWE-918EPSS
Sin puntaje EPSS aún (CVE muy reciente).
Descripción técnica
OpenClaw before 2026.4.22 contains a server-side request forgery vulnerability in the Zalo plugin's sendPhoto function that fails to validate outbound photo URLs through the SSRF guard. Attackers can bypass SSRF protection by providing malicious photo URLs to the Zalo Bot API, enabling unauthorized access to internal resources.