CVE-2026-28469

HIGH

OpenClaw <2026.2.14 - Auth Bypass

Title source: llm
STIX 2.1

Description

OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets share the same HTTP path. Attackers can exploit first-match request verification semantics to process inbound webhook events under incorrect account contexts, bypassing intended allowlists and session policies.

Scores

CVSS v3 7.5
EPSS 0.0004
EPSS Percentile 11.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-639
Status published
Products (3)
npm/clawdbot 0npm
npm/openclaw 0 - 2026.2.14npm
openclaw/openclaw < 2026.2.14
Published Mar 05, 2026
Tracked Since Mar 06, 2026