<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Zalo Plugin — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/zalo-plugin/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 20:16:35 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/zalo-plugin/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw SSRF Vulnerability in Zalo Plugin (CVE-2026-44116)</title><link>https://feed.craftedsignal.io/briefs/2026-05-openclaw-ssrf/</link><pubDate>Wed, 06 May 2026 20:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-openclaw-ssrf/</guid><description>OpenClaw before 2026.4.22 is vulnerable to server-side request forgery (SSRF) due to improper validation of outbound photo URLs in the Zalo plugin's sendPhoto function, allowing attackers to potentially access internal resources by providing malicious photo URLs to the Zalo Bot API.</description><content:encoded><![CDATA[<p>OpenClaw, a web application, is susceptible to a server-side request forgery (SSRF) vulnerability (CVE-2026-44116) affecting versions prior to 2026.4.22. The vulnerability resides within the Zalo plugin&rsquo;s sendPhoto function, specifically in how it validates outbound photo URLs. The absence of proper SSRF guard validation allows a malicious actor to craft photo URLs that, when processed by the Zalo Bot API, can bypass intended security controls. This can lead to unauthorized access to internal resources that would otherwise be protected. Successful exploitation enables an attacker to make requests on behalf of the server, potentially exposing sensitive data or enabling further malicious activity within the internal network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an OpenClaw instance running a version prior to 2026.4.22 with the Zalo plugin enabled.</li>
<li>The attacker crafts a malicious photo URL designed to target an internal resource.</li>
<li>The attacker utilizes the Zalo Bot API to send a request including the crafted malicious photo URL to the sendPhoto function.</li>
<li>The sendPhoto function attempts to retrieve the photo from the attacker-controlled URL without proper SSRF validation.</li>
<li>The OpenClaw server makes an HTTP request to the internal resource specified in the malicious URL.</li>
<li>The internal resource responds to the OpenClaw server, potentially disclosing sensitive information.</li>
<li>The attacker retrieves the response from the internal resource, gaining unauthorized access to sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-44116 can lead to the exposure of sensitive internal resources. An attacker could potentially access internal databases, configuration files, or other services that are not intended to be exposed to the public internet. The specific impact depends on the nature of the internal resources accessible and could range from information disclosure to remote code execution if coupled with other vulnerabilities. The lack of specific victim numbers or targeted sectors in the report makes quantification difficult, but the high CVSS score suggests a significant potential for damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.22 or later to patch the SSRF vulnerability in the Zalo plugin&rsquo;s sendPhoto function as stated in the vulnerability description.</li>
<li>Deploy the Sigma rule <code>Detect OpenClaw Zalo Plugin SSRF Attempt</code> to monitor for suspicious requests to internal resources originating from the OpenClaw server.</li>
<li>Review and harden internal network segmentation to limit the impact of potential SSRF vulnerabilities as the successful exploitation could expose internal resources.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cve-2026-44116</category><category>openclaw</category><category>zalo</category></item></channel></rss>