Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-28469 (GCVE-0-2026-28469)
Vulnerability from cvelistv5 – Published: 2026-03-05 21:59 – Updated: 2026-03-09 18:02- CWE-639 - Authorization Bypass Through User-Controlled Key
| URL | Tags |
|---|---|
| https://github.com/openclaw/openclaw/security/adv… | vendor-advisory |
| https://github.com/openclaw/openclaw/commit/61d59… | patch |
| https://www.vulncheck.com/advisories/openclaw-cro… | third-party-advisory |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-28469",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-09T18:01:17.718430Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-09T18:02:19.456Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"packageURL": "pkg:npm/openclaw",
"product": "OpenClaw",
"vendor": "OpenClaw",
"versions": [
{
"lessThan": "2026.2.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "2026.2.14",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Vincent Koc (@vincentkoc)"
}
],
"datePublic": "2026-02-15T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eOpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets share the same HTTP path. Attackers can exploit first-match request verification semantics to process inbound webhook events under incorrect account contexts, bypassing intended allowlists and session policies.\u003c/p\u003e"
}
],
"value": "OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets share the same HTTP path. Attackers can exploit first-match request verification semantics to process inbound webhook events under incorrect account contexts, bypassing intended allowlists and session policies."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-639",
"description": "Authorization Bypass Through User-Controlled Key",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-06T16:38:21.343Z",
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck"
},
"references": [
{
"name": "GitHub Security Advisory (GHSA-rq6g-px6m-c248)",
"tags": [
"vendor-advisory"
],
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rq6g-px6m-c248"
},
{
"name": "Patch Commit",
"tags": [
"patch"
],
"url": "https://github.com/openclaw/openclaw/commit/61d59a802869177d9cef52204767cd83357ab79e"
},
{
"name": "VulnCheck Advisory: OpenClaw \u003c 2026.2.14 - Cross-Account Policy Context Misrouting via Shared Webhook Path Ambiguity",
"tags": [
"third-party-advisory"
],
"url": "https://www.vulncheck.com/advisories/openclaw-cross-account-policy-context-misrouting-via-shared-webhook-path-ambiguity"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "OpenClaw \u003c 2026.2.14 - Cross-Account Policy Context Misrouting via Shared Webhook Path Ambiguity",
"x_generator": {
"engine": "vulncheck"
}
}
},
"cveMetadata": {
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"cveId": "CVE-2026-28469",
"datePublished": "2026-03-05T21:59:45.613Z",
"dateReserved": "2026-02-27T19:19:10.890Z",
"dateUpdated": "2026-03-09T18:02:19.456Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-28469",
"date": "2026-05-14",
"epss": "0.00042",
"percentile": "0.12755"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-28469\",\"sourceIdentifier\":\"disclosure@vulncheck.com\",\"published\":\"2026-03-05T22:16:20.407\",\"lastModified\":\"2026-03-09T20:29:33.457\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets share the same HTTP path. Attackers can exploit first-match request verification semantics to process inbound webhook events under incorrect account contexts, bypassing intended allowlists and session policies.\"},{\"lang\":\"es\",\"value\":\"Versiones de OpenClaw anteriores a 2026.2.14 contienen una vulnerabilidad de enrutamiento de webhook en el componente de monitor de Google Chat que permite el enrutamiento incorrecto del contexto de pol\u00edticas entre cuentas cuando m\u00faltiples destinos de webhook comparten la misma ruta HTTP. Los atacantes pueden exploit la sem\u00e1ntica de verificaci\u00f3n de solicitudes de primera coincidencia para procesar eventos de webhook entrantes bajo contextos de cuenta incorrectos, eludiendo las listas de permitidos previstas y las pol\u00edticas de sesi\u00f3n.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"disclosure@vulncheck.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-639\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*\",\"versionEndExcluding\":\"2026.2.14\",\"matchCriteriaId\":\"0F3079A3-9FBD-4E87-821D-5CAF0622C555\"}]}]}],\"references\":[{\"url\":\"https://github.com/openclaw/openclaw/commit/61d59a802869177d9cef52204767cd83357ab79e\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/openclaw/openclaw/security/advisories/GHSA-rq6g-px6m-c248\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.vulncheck.com/advisories/openclaw-cross-account-policy-context-misrouting-via-shared-webhook-path-ambiguity\",\"source\":\"disclosure@vulncheck.com\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-28469\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-09T18:01:17.718430Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-09T18:02:13.901Z\"}}], \"cna\": {\"title\": \"OpenClaw \u003c 2026.2.14 - Cross-Account Policy Context Misrouting via Shared Webhook Path Ambiguity\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"Vincent Koc (@vincentkoc)\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 8.2, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N\", \"exploitMaturity\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"OpenClaw\", \"product\": \"OpenClaw\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"2026.2.14\", \"versionType\": \"custom\"}], \"packageURL\": \"pkg:npm/openclaw\", \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2026-02-15T00:00:00.000Z\", \"references\": [{\"url\": \"https://github.com/openclaw/openclaw/security/advisories/GHSA-rq6g-px6m-c248\", \"name\": \"GitHub Security Advisory (GHSA-rq6g-px6m-c248)\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://github.com/openclaw/openclaw/commit/61d59a802869177d9cef52204767cd83357ab79e\", \"name\": \"Patch Commit\", \"tags\": [\"patch\"]}, {\"url\": \"https://www.vulncheck.com/advisories/openclaw-cross-account-policy-context-misrouting-via-shared-webhook-path-ambiguity\", \"name\": \"VulnCheck Advisory: OpenClaw \u003c 2026.2.14 - Cross-Account Policy Context Misrouting via Shared Webhook Path Ambiguity\", \"tags\": [\"third-party-advisory\"]}], \"x_generator\": {\"engine\": \"vulncheck\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets share the same HTTP path. Attackers can exploit first-match request verification semantics to process inbound webhook events under incorrect account contexts, bypassing intended allowlists and session policies.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eOpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets share the same HTTP path. Attackers can exploit first-match request verification semantics to process inbound webhook events under incorrect account contexts, bypassing intended allowlists and session policies.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-639\", \"description\": \"Authorization Bypass Through User-Controlled Key\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"2026.2.14\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"83251b91-4cc7-4094-a5c7-464a1b83ea10\", \"shortName\": \"VulnCheck\", \"dateUpdated\": \"2026-03-06T16:38:21.343Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-28469\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-09T18:02:19.456Z\", \"dateReserved\": \"2026-02-27T19:19:10.890Z\", \"assignerOrgId\": \"83251b91-4cc7-4094-a5c7-464a1b83ea10\", \"datePublished\": \"2026-03-05T21:59:45.613Z\", \"assignerShortName\": \"VulnCheck\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
WID-SEC-W-2026-0424
Vulnerability from csaf_certbund - Published: 2026-02-15 23:00 - Updated: 2026-03-05 23:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source OpenClaw <2026.2.14
Open Source / OpenClaw
|
<2026.2.14 |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "OpenClaw ist ein pers\u00f6nlicher KI-Assistent zur Ausf\u00fchrung auf eigenen Ger\u00e4ten.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann diese Schwachstellen in OpenClaw ausnutzen, um beliebigen Programmcode auszuf\u00fchren, sich erh\u00f6hte Berechtigungen zu verschaffen, Sicherheitsma\u00dfnahmen zu umgehen, Daten zu manipulieren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder andere, nicht n\u00e4her bezeichnete Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0424 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0424.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0424 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0424"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-33rq-m5x2-fvgf"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3fqr-4cg8-h96q"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3hcm-ggvf-rch5"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3m3q-x3gj-f79x"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4564-pvr2-qq4h"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-47q7-97xp-m272"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4hg8-92x6-h2f3"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4rj2-gpmh-qq5x"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-56f2-hvwg-5743"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-5xfq-5mr7-426q"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-64qx-vpxx-mvqf"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-782p-5fr5-7fj8"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-7q2j-c4q5-rm27"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-7rcp-mxpq-72pj"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-7vwx-582j-j332"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-7xhj-55q9-pc3m"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-8mh7-phf8-xgfm"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-943q-mwmv-hhvh"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-c37p-4qqg-3p76"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-chm2-m3w2-wcxm"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-cv7m-c9jx-vg7q"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-fhvm-j76f-qmjv"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-g27f-9qjv-22pm"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-g34w-4xqq-h79m"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-g6q9-8fvw-f7rf"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-gq9c-wg68-gwj2"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-gv46-4xfq-jv58"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-h3f9-mjwj-w476"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-h89v-j3x9-8wqj"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-h9g4-589h-68xv"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-hv93-r4j3-q65f"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-j27p-hq53-9wgc"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jfv4-h8mc-jcp8"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jmm5-fvh5-gf4p"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jqpq-mgvm-f9r6"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jrvc-8ff5-2f9f"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-m7x8-2w3w-pr42"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mj5r-hh7j-4gxf"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mp5h-m6qj-6292"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mqpw-46fh-299h"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mr32-vwc2-5j6h"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mv9j-6xhh-g383"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-p25h-9q54-ffvw"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-pchc-86f6-8758"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-pg2v-8xwh-qhcc"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-pv58-549p-qh99"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-q447-rj3r-2cgh"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-qj77-c3c8-9c3q"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-qpjj-47vm-64pj"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-qrq5-wjgg-rvqw"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-qw99-grcx-4pvm"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-r5h9-vjqc-hq3r"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rmxw-jxxx-4cpc"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rq6g-px6m-c248"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rv39-79c4-7459"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rwj8-p9vq-25gv"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v6c6-vqqg-w888"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v773-r54f-q32w"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v892-hwpg-jwqp"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-w2cg-vxx6-5xjg"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-w5c7-9qqw-6645"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-wfp2-v9c7-fh79"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-x22m-j5qq-j49m"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-xc7w-v5x6-cc87"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-xvhf-x56f-2hpp"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-xw4p-pw82-hqr7"
},
{
"category": "external",
"summary": "openclaw GitHub vom 2026-02-15",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-xwjm-j929-xq7c"
}
],
"source_lang": "en-US",
"title": "OpenClaw: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-05T23:00:00.000+00:00",
"generator": {
"date": "2026-03-06T07:07:21.689+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0424",
"initial_release_date": "2026-02-15T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "2",
"summary": "CVE-Nummern erg\u00e4nzt"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2026.2.14",
"product": {
"name": "Open Source OpenClaw \u003c2026.2.14",
"product_id": "T050918"
}
},
{
"category": "product_version",
"name": "2026.2.14",
"product": {
"name": "Open Source OpenClaw 2026.2.14",
"product_id": "T050918-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:openclaw:openclaw:2026.2.14"
}
}
}
],
"category": "product_name",
"name": "OpenClaw"
}
],
"category": "vendor",
"name": "Open Source"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-28391",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28391"
},
{
"cve": "CVE-2026-28392",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28392"
},
{
"cve": "CVE-2026-28393",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28393"
},
{
"cve": "CVE-2026-28395",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28395"
},
{
"cve": "CVE-2026-28446",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28446"
},
{
"cve": "CVE-2026-28447",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28447"
},
{
"cve": "CVE-2026-28448",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28448"
},
{
"cve": "CVE-2026-28450",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28450"
},
{
"cve": "CVE-2026-28451",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28451"
},
{
"cve": "CVE-2026-28452",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28452"
},
{
"cve": "CVE-2026-28453",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28453"
},
{
"cve": "CVE-2026-28454",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28454"
},
{
"cve": "CVE-2026-28456",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28456"
},
{
"cve": "CVE-2026-28457",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28457"
},
{
"cve": "CVE-2026-28458",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28458"
},
{
"cve": "CVE-2026-28459",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28459"
},
{
"cve": "CVE-2026-28462",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28462"
},
{
"cve": "CVE-2026-28463",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28463"
},
{
"cve": "CVE-2026-28464",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28464"
},
{
"cve": "CVE-2026-28465",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28465"
},
{
"cve": "CVE-2026-28466",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28466"
},
{
"cve": "CVE-2026-28467",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28467"
},
{
"cve": "CVE-2026-28468",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28468"
},
{
"cve": "CVE-2026-28469",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28469"
},
{
"cve": "CVE-2026-28470",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28470"
},
{
"cve": "CVE-2026-28471",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28471"
},
{
"cve": "CVE-2026-28472",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28472"
},
{
"cve": "CVE-2026-28473",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28473"
},
{
"cve": "CVE-2026-28474",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28474"
},
{
"cve": "CVE-2026-28475",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28475"
},
{
"cve": "CVE-2026-28476",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28476"
},
{
"cve": "CVE-2026-28477",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28477"
},
{
"cve": "CVE-2026-28478",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28478"
},
{
"cve": "CVE-2026-28480",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28480"
},
{
"cve": "CVE-2026-28481",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28481"
},
{
"cve": "CVE-2026-28482",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28482"
},
{
"cve": "CVE-2026-28485",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28485"
},
{
"cve": "CVE-2026-28486",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-28486"
},
{
"cve": "CVE-2026-29606",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-29606"
},
{
"cve": "CVE-2026-29609",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-29609"
},
{
"cve": "CVE-2026-29610",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-29610"
},
{
"cve": "CVE-2026-29611",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-29611"
},
{
"cve": "CVE-2026-29612",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-29612"
},
{
"cve": "CVE-2026-29613",
"product_status": {
"known_affected": [
"T050918"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-29613"
}
]
}
GHSA-RQ6G-PX6M-C248
Vulnerability from github – Published: 2026-02-18 00:54 – Updated: 2026-03-06 01:03Summary
When multiple Google Chat webhook targets are registered on the same HTTP path, and request verification succeeds for more than one target, inbound webhook events could be routed by first-match semantics. This can cause cross-account policy/context misrouting.
Affected Packages / Versions
- npm:
openclaw<= 2026.2.13 - npm:
clawdbot<= 2026.1.24-3
Details
Affected component: extensions/googlechat/src/monitor.ts.
Baseline behavior allowed multiple webhook targets per path and selected the first target that passed verifyGoogleChatRequest(...). In shared-path deployments where multiple targets can verify successfully (for example, equivalent audience validation), inbound events could be processed under the wrong account context (wrong allowlist/session/policy).
Fix
- Fix commit (merged to
main):61d59a802869177d9cef52204767cd83357ab79e openclawwill be patched in the next planned release:2026.2.14.
clawdbot is a legacy/deprecated package name; no patched version is currently planned. Migrate to openclaw and upgrade to openclaw >= 2026.2.14.
Workaround
Ensure each Google Chat webhook target uses a unique webhook path so routing is never ambiguous.
Release Process Note
The advisory is pre-populated with the planned patched version. After the npm release is published, the remaining action should be to publish the advisory.
Thanks @vincentkoc for reporting.
Fix commit 61d59a802869177d9cef52204767cd83357ab79e confirmed on main and in v2026.2.14. Upgrade to openclaw >= 2026.2.14.
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "openclaw"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2026.2.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "npm",
"name": "clawdbot"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2026.1.24-3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-28469"
],
"database_specific": {
"cwe_ids": [
"CWE-284",
"CWE-639"
],
"github_reviewed": true,
"github_reviewed_at": "2026-02-18T00:54:14Z",
"nvd_published_at": "2026-03-05T22:16:20Z",
"severity": "HIGH"
},
"details": "## Summary\nWhen multiple Google Chat webhook targets are registered on the same HTTP path, and request verification succeeds for more than one target, inbound webhook events could be routed by first-match semantics. This can cause cross-account policy/context misrouting.\n\n## Affected Packages / Versions\n- npm: `openclaw` \u003c= 2026.2.13\n- npm: `clawdbot` \u003c= 2026.1.24-3\n\n## Details\nAffected component: `extensions/googlechat/src/monitor.ts`.\n\nBaseline behavior allowed multiple webhook targets per path and selected the first target that passed `verifyGoogleChatRequest(...)`. In shared-path deployments where multiple targets can verify successfully (for example, equivalent audience validation), inbound events could be processed under the wrong account context (wrong allowlist/session/policy).\n\n## Fix\n- Fix commit (merged to `main`): `61d59a802869177d9cef52204767cd83357ab79e`\n- `openclaw` will be patched in the next planned release: `2026.2.14`.\n\n`clawdbot` is a legacy/deprecated package name; no patched version is currently planned. Migrate to `openclaw` and upgrade to `openclaw \u003e= 2026.2.14`.\n\n## Workaround\nEnsure each Google Chat webhook target uses a unique webhook path so routing is never ambiguous.\n\n## Release Process Note\nThe advisory is pre-populated with the planned patched version. After the npm release is published, the remaining action should be to publish the advisory.\n\nThanks @vincentkoc for reporting.\n\n---\n\nFix commit 61d59a802869177d9cef52204767cd83357ab79e confirmed on main and in v2026.2.14. Upgrade to `openclaw \u003e= 2026.2.14`.",
"id": "GHSA-rq6g-px6m-c248",
"modified": "2026-03-06T01:03:18Z",
"published": "2026-02-18T00:54:14Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rq6g-px6m-c248"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28469"
},
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/commit/61d59a802869177d9cef52204767cd83357ab79e"
},
{
"type": "PACKAGE",
"url": "https://github.com/openclaw/openclaw"
},
{
"type": "WEB",
"url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14"
},
{
"type": "WEB",
"url": "https://www.vulncheck.com/advisories/openclaw-cross-account-policy-context-misrouting-via-shared-webhook-path-ambiguity"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:L/SI:L/SA:N",
"type": "CVSS_V4"
}
],
"summary": "OpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misrouting"
}
FKIE_CVE-2026-28469
Vulnerability from fkie_nvd - Published: 2026-03-05 22:16 - Updated: 2026-03-09 20:29{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "0F3079A3-9FBD-4E87-821D-5CAF0622C555",
"versionEndExcluding": "2026.2.14",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets share the same HTTP path. Attackers can exploit first-match request verification semantics to process inbound webhook events under incorrect account contexts, bypassing intended allowlists and session policies."
},
{
"lang": "es",
"value": "Versiones de OpenClaw anteriores a 2026.2.14 contienen una vulnerabilidad de enrutamiento de webhook en el componente de monitor de Google Chat que permite el enrutamiento incorrecto del contexto de pol\u00edticas entre cuentas cuando m\u00faltiples destinos de webhook comparten la misma ruta HTTP. Los atacantes pueden exploit la sem\u00e1ntica de verificaci\u00f3n de solicitudes de primera coincidencia para procesar eventos de webhook entrantes bajo contextos de cuenta incorrectos, eludiendo las listas de permitidos previstas y las pol\u00edticas de sesi\u00f3n."
}
],
"id": "CVE-2026-28469",
"lastModified": "2026-03-09T20:29:33.457",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "disclosure@vulncheck.com",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "disclosure@vulncheck.com",
"type": "Secondary"
}
]
},
"published": "2026-03-05T22:16:20.407",
"references": [
{
"source": "disclosure@vulncheck.com",
"tags": [
"Patch"
],
"url": "https://github.com/openclaw/openclaw/commit/61d59a802869177d9cef52204767cd83357ab79e"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rq6g-px6m-c248"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.vulncheck.com/advisories/openclaw-cross-account-policy-context-misrouting-via-shared-webhook-path-ambiguity"
}
],
"sourceIdentifier": "disclosure@vulncheck.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-639"
}
],
"source": "disclosure@vulncheck.com",
"type": "Secondary"
}
]
}
CNVD-2026-13596
Vulnerability from cnvd - Published: 2026-03-13目前厂商已发布升级补丁以修复漏洞。补丁获取链接: https://github.com/openclaw/openclaw/security/advisories/GHSA-rq6g-px6m-c248
| Name | OpenClaw OpenClaw <2026.2.14 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2026-28469",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2026-28469"
}
},
"description": "OpenClaw\u662fOpenClaw\u5f00\u6e90\u7684\u4e00\u4e2a\u667a\u80fd\u4eba\u5de5\u52a9\u7406\u3002\n\nOpenClaw\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eGoogle Chat\u76d1\u89c6\u5668\u7ec4\u4ef6\u5b58\u5728Webhook\u8def\u7531\u95ee\u9898\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u8de8\u8d26\u6237\u7b56\u7565\u4e0a\u4e0b\u6587\u9519\u8bef\u8def\u7531\uff0c\u4ece\u800c\u7ed5\u8fc7\u9884\u671f\u7684\u5141\u8bb8\u5217\u8868\u548c\u4f1a\u8bdd\u7b56\u7565\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\u3002\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://github.com/openclaw/openclaw/security/advisories/GHSA-rq6g-px6m-c248",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2026-13596",
"openTime": "2026-03-13",
"patchDescription": "OpenClaw\u662fOpenClaw\u5f00\u6e90\u7684\u4e00\u4e2a\u667a\u80fd\u4eba\u5de5\u52a9\u7406\u3002\r\n\r\nOpenClaw\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eGoogle Chat\u76d1\u89c6\u5668\u7ec4\u4ef6\u5b58\u5728Webhook\u8def\u7531\u95ee\u9898\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u8de8\u8d26\u6237\u7b56\u7565\u4e0a\u4e0b\u6587\u9519\u8bef\u8def\u7531\uff0c\u4ece\u800c\u7ed5\u8fc7\u9884\u671f\u7684\u5141\u8bb8\u5217\u8868\u548c\u4f1a\u8bdd\u7b56\u7565\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "OpenClaw\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2026-13596\uff09\u7684\u8865\u4e01",
"products": {
"product": "OpenClaw OpenClaw \u003c2026.2.14"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2026-28469",
"serverity": "\u9ad8",
"submitTime": "2026-03-12",
"title": "OpenClaw\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2026-13596\uff09"
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.