Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.3
OpenClaw with Matrix plugin: Bypassing allowed identities
CVE-2026-28471
GHSA-rmxw-jxxx-4cpc
Summary
OpenClaw version 2026.1.14-1 and earlier, with the Matrix plugin enabled, can be tricked into allowing unauthorized access. This could allow an attacker to pretend to be someone they're not, potentially gaining access to sensitive information or actions. To fix this, update to version 2026.2.2 or later.
What to do
- Update steipete openclaw to version 2026.2.2.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| steipete | openclaw | > 2026.1.14-1 , <= 2026.2.2 | 2026.2.2 |
| openclaw | openclaw | > 2026.1.14-1 , <= 2026.2.2 | – |
Original title
OpenClaw version 2026.1.14-1 prior to 2026.2.2, with the Matrix plugin installed and enabled, contain a vulnerability in which DM allowlist matching could be bypassed by exact-matching against send...
Original description
OpenClaw version 2026.1.14-1 prior to 2026.2.2, with the Matrix plugin installed and enabled, contain a vulnerability in which DM allowlist matching could be bypassed by exact-matching against sender display names and localparts without homeserver validation. Remote Matrix users can impersonate allowed identities by using attacker-controlled display names or matching localparts from different homeservers to reach the routing and agent pipeline.
nvd CVSS3.1
5.3
nvd CVSS4.0
6.3
Vulnerability type
CWE-287
Improper Authentication
CWE-290
- https://github.com/openclaw/openclaw/commit/8f3bfbd1c4fb967a2ddb5b4b9a0578492081...
- https://github.com/openclaw/openclaw/security/advisories/GHSA-rmxw-jxxx-4cpc
- https://www.vulncheck.com/advisories/openclaw-allowlist-bypass-via-displayname-a...
- https://github.com/openclaw/openclaw/releases/tag/v2026.2.2
- https://nvd.nist.gov/vuln/detail/CVE-2026-28471
- https://github.com/advisories/GHSA-rmxw-jxxx-4cpc
Published: 5 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026