CVE-2026-28471

MEDIUM

OpenClaw 2026.1.14-1 - Auth Bypass

Title source: llm
STIX 2.1

Description

OpenClaw version 2026.1.14-1 prior to 2026.2.2, with the Matrix plugin installed and enabled, contain a vulnerability in which DM allowlist matching could be bypassed by exact-matching against sender display names and localparts without homeserver validation. Remote Matrix users can impersonate allowed identities by using attacker-controlled display names or matching localparts from different homeservers to reach the routing and agent pipeline.

Scores

CVSS v3 5.3
EPSS 0.0004
EPSS Percentile 12.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-287
Status published
Products (2)
npm/openclaw 2026.1.14-1 - 2026.2.2npm
openclaw/openclaw 2026.1.14-1 - 2026.2.2
Published Mar 05, 2026
Tracked Since Mar 06, 2026