CVE-2026-43526
Undergoing Analysis Undergoing Analysis - In Progress
Server-Side Request Forgery in OpenClaw QQBot

Publication date: 2026-05-05

Last updated on: 2026-05-05

Assigner: VulnCheck

Description
OpenClaw before 2026.4.12 contains a server-side request forgery vulnerability in QQBot reply media URL handling that allows attackers to fetch arbitrary content. Attackers can exploit this by providing malicious media URLs that trigger SSRF requests, with fetched bytes subsequently re-uploaded through the channel.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-05
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-05-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.4.12 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-43526 is a Server-Side Request Forgery (SSRF) vulnerability in OpenClaw versions before 2026.4.12, specifically in the QQBot reply media URL handling. Attackers can exploit this by providing malicious media URLs that cause the server to make unauthorized HTTP requests to arbitrary locations. The content fetched by these requests can then be re-uploaded through the QQBot channel, potentially allowing attackers to access internal resources or manipulate data.

The vulnerability arises because QQBot treated remote media URLs as trusted sources without sufficient validation, enabling SSRF attacks. The issue was fixed by implementing an explicit hostname allowlist for media host domains and routing remote media fetches through SSRF-guarded mechanisms.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to make your server perform unauthorized HTTP requests to arbitrary locations, potentially exposing internal or sensitive resources that are not normally accessible externally.

Additionally, the attacker can cause the server to fetch malicious content and re-upload it through the QQBot channel, which could be used to spread malicious data or conduct further attacks within your environment.

Because the vulnerability has a high severity rating (CVSS 8.3), it poses a significant security risk if left unpatched.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the CVE-2026-43526 vulnerability, you should upgrade OpenClaw to version 2026.4.12 or later, as these versions include the fix that enforces an explicit URL allowlist policy and routes remote media fetches through SSRF-guarded mechanisms.

The fix involves updating the hostname allowlist for media host domains to restrict QQBot to trusted domains only, preventing unauthorized SSRF requests.

Ensure that your deployment is running the patched version (2026.4.12 or newer, with 2026.4.14 being the latest stable release including the fix).


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify how the SSRF vulnerability in OpenClaw affects compliance with common standards and regulations such as GDPR or HIPAA.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves Server-Side Request Forgery (SSRF) in the QQBot reply media URL handling of OpenClaw versions before 2026.4.12. Detection would focus on identifying unauthorized or suspicious outbound HTTP requests initiated by the QQBot component to untrusted or unexpected domains.

To detect exploitation attempts or the presence of this vulnerability on your system or network, you can monitor network traffic for unusual outbound requests from the OpenClaw server, especially HTTP requests to domains not included in the allowed hostname list.

Suggested commands include using network monitoring tools or packet capture utilities such as tcpdump or Wireshark to filter outbound HTTP requests from the OpenClaw server process or IP address.

  • tcpdump -i <interface> -nn -s0 -A 'tcp dst port 80 and src host <openclaw_server_ip>'
  • tcpdump -i <interface> -nn -s0 -A 'tcp dst port 443 and src host <openclaw_server_ip>'
  • Use process monitoring tools (e.g., lsof, netstat) on the OpenClaw server to identify unexpected outbound connections from the QQBot process.
  • Check OpenClaw logs for media URL fetch requests and verify if URLs are outside the allowed hostname list domains (*.weiyun.com, *.qq.com.cn, *.ugcimg.cn, *.tencentcos.cn, *.qpic.cn, *.qq.com, *.myqcloud.com, *.tencentcos.com).

Since the vulnerability is related to improper URL validation, reviewing application logs for media URL handling errors or unexpected URL patterns can also help detect exploitation attempts.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart