OpenClaw's QQ Bot extension failed to route all media download paths through its SSRF guard and allowlist policy, meaning a crafted media URL in a QQ message could cause the agent to make unauthorized requests to internal network resources. The vendor explicitly scoped this to OpenClaw's local-assistant trust model — this is not a multi-tenant service boundary issue — and severity is medium with no CVSS vector, no EPSS data, no public exploit, and no CISA KEV listing. That said, SSRF in an AI agent tool is particularly sensitive because the agent process often has access to cloud metadata endpoints (169.254.169.254), locally running services, or internal APIs that a browser-based SSRF would not reach. Teams running OpenClaw should upgrade to 2026.4.8 immediately; no workaround short of patching is documented.
Risk Assessment
Medium risk in practice. The local-assistant trust model limits blast radius compared to a multi-tenant deployment, but SSRF in an AI agent tool is more dangerous than in a typical web app because agent processes frequently run with elevated local network access. The package's history of 60 CVEs is a material signal about overall security posture and should factor into adoption decisions. No active exploitation evidence exists today.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| openclaw | npm | < 2026.4.8 | 2026.4.8 |
Do you use openclaw? You're affected.
Severity & Risk
Recommended Action
- Upgrade openclaw to version 2026.4.8 (patched, commit d7c3210cd6f5fdfdc1beff4c9541673e814354d5).
- Audit QQ Bot extension configuration to verify SSRF allowlists cover all media fetch code paths post-upgrade.
- Apply host-level or container egress controls to restrict outbound connections from the OpenClaw process to only required external endpoints — block access to RFC-1918 ranges and 169.254.169.254.
- Monitor process-level network logs for unexpected requests to internal ranges originating from the OpenClaw binary.
- Given the package's 60-CVE history, evaluate whether openclaw meets your organization's third-party software acceptance criteria.
Classification
Compliance Impact
This CVE is relevant to:
Related AI Incidents (1)
Source: AI Incident Database (AIID)
Frequently Asked Questions
What is GHSA-3fv3-6p2v-gxwj?
OpenClaw's QQ Bot extension failed to route all media download paths through its SSRF guard and allowlist policy, meaning a crafted media URL in a QQ message could cause the agent to make unauthorized requests to internal network resources. The vendor explicitly scoped this to OpenClaw's local-assistant trust model — this is not a multi-tenant service boundary issue — and severity is medium with no CVSS vector, no EPSS data, no public exploit, and no CISA KEV listing. That said, SSRF in an AI agent tool is particularly sensitive because the agent process often has access to cloud metadata endpoints (169.254.169.254), locally running services, or internal APIs that a browser-based SSRF would not reach. Teams running OpenClaw should upgrade to 2026.4.8 immediately; no workaround short of patching is documented.
Is GHSA-3fv3-6p2v-gxwj actively exploited?
No confirmed active exploitation of GHSA-3fv3-6p2v-gxwj has been reported, but organizations should still patch proactively.
How to fix GHSA-3fv3-6p2v-gxwj?
1. Upgrade openclaw to version 2026.4.8 (patched, commit d7c3210cd6f5fdfdc1beff4c9541673e814354d5). 2. Audit QQ Bot extension configuration to verify SSRF allowlists cover all media fetch code paths post-upgrade. 3. Apply host-level or container egress controls to restrict outbound connections from the OpenClaw process to only required external endpoints — block access to RFC-1918 ranges and 169.254.169.254. 4. Monitor process-level network logs for unexpected requests to internal ranges originating from the OpenClaw binary. 5. Given the package's 60-CVE history, evaluate whether openclaw meets your organization's third-party software acceptance criteria.
What systems are affected by GHSA-3fv3-6p2v-gxwj?
This vulnerability affects the following AI/ML architecture patterns: agent frameworks, AI assistant integrations, messaging platform plugins.
What is the CVSS score for GHSA-3fv3-6p2v-gxwj?
No CVSS score has been assigned yet.
Technical Details
NVD Description
## Impact QQ Bot Extension: Missing SSRF Protection on All Media Fetch Paths. QQ Bot media download paths were not consistently routed through the SSRF guard and allowlist policy. OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenant service boundary. ## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `<= 2026.4.2` - Patched versions: `2026.4.8` ## Fix The issue was fixed on `main` and is available in the patched npm version listed above. The verified fixed tree is commit `d7c3210cd6f5fdfdc1beff4c9541673e814354d5`. ## Verification The fix was re-checked against `main` before publication, including targeted regression tests for the affected security boundary. ## Credits Thanks @adithyan-ak for reporting.
Exploitation Scenario
An adversary with the ability to send QQ messages to an OpenClaw user (e.g., a social engineering lure or a compromised QQ contact) embeds a media attachment URL pointing to an internal target such as http://169.254.169.254/latest/meta-data/ on a cloud instance or http://localhost:8080/api/admin on a locally running service. When OpenClaw's QQ Bot extension processes the message and fetches the media, it takes a code path that was not covered by the SSRF guard, bypassing the allowlist policy. The HTTP response from the internal target is returned to the agent context; if the agent logs, displays, or further processes this response, the attacker gains read access to internal data or can probe services behind the local network boundary.
Weaknesses (CWE)
References
Timeline
Related Vulnerabilities
CVE-2026-30741 9.8 OpenClaw: RCE via request-side prompt injection
Same package: openclaw CVE-2026-28451 9.3 OpenClaw: SSRF via Feishu extension exposes internal services
Same package: openclaw GHSA-m3mh-3mpg-37hw 8.6 OpenClaw: .npmrc hijack enables RCE on plugin install
Same package: openclaw CVE-2026-27001 7.8 OpenClaw: prompt injection via unsanitized workspace path
Same package: openclaw GHSA-hr5v-j9h9-xjhg 7.7 OpenClaw: sandbox escape via mediaUrl path traversal
Same package: openclaw
AI Threat Alert