Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.3

OpenClaw with Matrix plugin: Bypassing allowed identities

CVE-2026-28471 GHSA-rmxw-jxxx-4cpc
Summary

OpenClaw version 2026.1.14-1 and earlier, with the Matrix plugin enabled, can be tricked into allowing unauthorized access. This could allow an attacker to pretend to be someone they're not, potentially gaining access to sensitive information or actions. To fix this, update to version 2026.2.2 or later.

What to do
  • Update steipete openclaw to version 2026.2.2.
Affected software
VendorProductAffected versionsFix available
steipete openclaw > 2026.1.14-1 , <= 2026.2.2 2026.2.2
openclaw openclaw > 2026.1.14-1 , <= 2026.2.2 –
Original title
OpenClaw version 2026.1.14-1 prior to 2026.2.2, with the Matrix plugin installed and enabled, contain a vulnerability in which DM allowlist matching could be bypassed by exact-matching against send...
Original description
OpenClaw version 2026.1.14-1 prior to 2026.2.2, with the Matrix plugin installed and enabled, contain a vulnerability in which DM allowlist matching could be bypassed by exact-matching against sender display names and localparts without homeserver validation. Remote Matrix users can impersonate allowed identities by using attacker-controlled display names or matching localparts from different homeservers to reach the routing and agent pipeline.
nvd CVSS3.1 5.3
nvd CVSS4.0 6.3
Vulnerability type
CWE-287 Improper Authentication
CWE-290
Published: 5 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026