CVE-2026-41914
Published: 28 April 2026
Summary
CVE-2026-41914 is a high-severity SSRF (CWE-918) vulnerability in Openclaw Openclaw. Its CVSS base score is 8.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 9.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2026-41914 by requiring timely patching to OpenClaw 2026.4.8, which enforces proper SSRF protections and endpoint validation via commit d7c3210.
Validates information inputs such as crafted URLs in QQ Bot media download paths to prevent SSRF exploitation and bypass of allowlist policies.
Enforces strict information flow control policies, including allowlists, to block unauthorized server-side requests to internal resources exploited in this SSRF vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SSRF vulnerability in public-facing OpenClaw server application directly enables initial access by exploiting the flaw to access internal resources, matching T1190.
NVD Description
OpenClaw before 2026.4.8 contains a server-side request forgery vulnerability in QQ Bot media download paths that bypass SSRF protection. Attackers can exploit unprotected media fetch endpoints to access internal resources and bypass allowlist policies.
Deeper analysisAI
CVE-2026-41914, published on 2026-04-28, is a server-side request forgery (SSRF) vulnerability classified under CWE-918, affecting OpenClaw versions prior to 2026.4.8. The flaw exists in the QQ Bot media download paths, where unprotected media fetch endpoints enable attackers to bypass existing SSRF protections and allowlist policies, allowing unauthorized access to internal resources. It carries a CVSS v3.1 base score of 8.5 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N), indicating high severity due to network accessibility, low attack complexity, and significant confidentiality impact.
Attackers with low privileges (PR:L), such as authenticated users interacting with the QQ Bot functionality, can exploit this over the network without user interaction. By sending crafted requests to the vulnerable media fetch endpoints, they can trick the server into issuing requests to internal systems or services, bypassing allowlist restrictions. This achieves high confidentiality impact (C:H) through potential data exfiltration and low integrity impact (I:L) across an expanded scope (S:C), with no availability disruption (A:N).
Mitigation is available in OpenClaw 2026.4.8, addressed via GitHub commit d7c3210cd6f5fdfdc1beff4c9541673e814354d5. Official advisories on GitHub (GHSA-3fv3-6p2v-gxwj) and VulnCheck detail the SSRF bypass in QQ Bot media paths and recommend immediate upgrades to patched versions to enforce proper SSRF protections and endpoint validation.
Details
- CWE(s)