OpenClaw before 2026.4.8 contains a server-side request forgery vulnerability in QQ Bot media download paths that bypass SSRF protection. Attackers can exploit unprotected media fetch endpoints to access internal resources and bypass allowlist policies.
References
Configurations
History
30 Apr 2026, 14:02
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openclaw/openclaw/commit/d7c3210cd6f5fdfdc1beff4c9541673e814354d5 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-3fv3-6p2v-gxwj - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-server-side-request-forgery-in-qq-bot-media-fetch-paths - Third Party Advisory | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
28 Apr 2026, 19:37
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-28 19:37
Updated : 2026-04-30 14:02
NVD link : CVE-2026-41914
Mitre link : CVE-2026-41914
CVE.ORG link : CVE-2026-41914
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-918
Server-Side Request Forgery (SSRF)
