Cyber Posture

CVE-2026-41914

HighPublic PoC

Published: 28 April 2026

Published
28 April 2026
Modified
30 April 2026
KEV Added
Patch
CVSS Score 8.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
EPSS Score 0.0003 9.2th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-41914 is a high-severity SSRF (CWE-918) vulnerability in Openclaw Openclaw. Its CVSS base score is 8.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 9.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2026-41914 by requiring timely patching to OpenClaw 2026.4.8, which enforces proper SSRF protections and endpoint validation via commit d7c3210.

prevent

Validates information inputs such as crafted URLs in QQ Bot media download paths to prevent SSRF exploitation and bypass of allowlist policies.

prevent

Enforces strict information flow control policies, including allowlists, to block unauthorized server-side requests to internal resources exploited in this SSRF vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SSRF vulnerability in public-facing OpenClaw server application directly enables initial access by exploiting the flaw to access internal resources, matching T1190.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenClaw before 2026.4.8 contains a server-side request forgery vulnerability in QQ Bot media download paths that bypass SSRF protection. Attackers can exploit unprotected media fetch endpoints to access internal resources and bypass allowlist policies.

Deeper analysisAI

CVE-2026-41914, published on 2026-04-28, is a server-side request forgery (SSRF) vulnerability classified under CWE-918, affecting OpenClaw versions prior to 2026.4.8. The flaw exists in the QQ Bot media download paths, where unprotected media fetch endpoints enable attackers to bypass existing SSRF protections and allowlist policies, allowing unauthorized access to internal resources. It carries a CVSS v3.1 base score of 8.5 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N), indicating high severity due to network accessibility, low attack complexity, and significant confidentiality impact.

Attackers with low privileges (PR:L), such as authenticated users interacting with the QQ Bot functionality, can exploit this over the network without user interaction. By sending crafted requests to the vulnerable media fetch endpoints, they can trick the server into issuing requests to internal systems or services, bypassing allowlist restrictions. This achieves high confidentiality impact (C:H) through potential data exfiltration and low integrity impact (I:L) across an expanded scope (S:C), with no availability disruption (A:N).

Mitigation is available in OpenClaw 2026.4.8, addressed via GitHub commit d7c3210cd6f5fdfdc1beff4c9541673e814354d5. Official advisories on GitHub (GHSA-3fv3-6p2v-gxwj) and VulnCheck detail the SSRF bypass in QQ Bot media paths and recommend immediate upgrades to patched versions to enforce proper SSRF protections and endpoint validation.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.4.8

CVEs Like This One

CVE-2026-35629Same product: Openclaw Openclaw
CVE-2026-31989Same product: Openclaw Openclaw
CVE-2026-41912Same product: Openclaw Openclaw
CVE-2026-22181Same product: Openclaw Openclaw
CVE-2026-28476Same product: Openclaw Openclaw
CVE-2026-6011Same product: Openclaw Openclaw
CVE-2026-41302Same product: Openclaw Openclaw
CVE-2026-43526Same product: Openclaw Openclaw
CVE-2026-42439Same product: Openclaw Openclaw
CVE-2026-34504Same product: Openclaw Openclaw

References