CVE-2026-43526 - Vulnerability Analysis
HighCVSS: 8.2Last Updated: May 5, 2026
OpenClaw - Server Side Request Forgery
Published: May 5, 2026Updated: May 5, 2026Remote Exploitable
Overview
OpenClaw < 2026.4.12 contains a server-side request forgery caused by improper handling of QQBot reply media URLs, letting attackers fetch arbitrary content remotely, exploit requires crafted malicious media URLs.
Severity & Score
Severity: High
CVSS Score: 8.2
Impact
Attackers can fetch arbitrary content from internal or external resources, potentially leading to information disclosure or further attacks.
Mitigation
Update to version 2026.4.12 or later.
References
- https://github.com/openclaw/openclaw/commit/08ae021d1f4f02e0ca5fd8a3b9659291c1ecf95a
- https://github.com/openclaw/openclaw/commit/ddb7a8dd80b8d5dd04aafa44ce7a4354b568bb2d
- https://github.com/openclaw/openclaw/security/advisories/GHSA-2767-2q9v-9326
- https://www.vulncheck.com/advisories/openclaw-server-side-request-forgery-via-qqbot-reply-media-url-handling
Related Resources
Details
- CVE ID
- CVE-2026-43526
- Severity
- High
- CVSS Score
- 8.2
- Type
- server_side_request_forgery
- Status
- new
CWE
- CWE-918
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N