CVE-2026-28450

MEDIUM

OpenClaw <2026.2.12 - Auth Bypass

Title source: llm
STIX 2.1

Description

OpenClaw versions prior to 2026.2.12 with the optional Nostr plugin enabled expose unauthenticated HTTP endpoints at /api/channels/nostr/:accountId/profile and /api/channels/nostr/:accountId/profile/import that allow reading and modifying Nostr profiles without gateway authentication. Remote attackers can exploit these endpoints to read sensitive profile data, modify Nostr profiles, persist malicious changes to gateway configuration, and publish signed Nostr events using the bot's private key when the gateway HTTP port is accessible beyond localhost.

Scores

CVSS v3 6.8
EPSS 0.0012
EPSS Percentile 30.3%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-306
Status published
Products (2)
npm/openclaw 0 - 2026.2.12npm
openclaw/openclaw < 2026.2.12
Published Mar 05, 2026
Tracked Since Mar 06, 2026