Home

Description

OpenClaw version 2026.1.14-1 prior to 2026.2.2, with the Matrix plugin installed and enabled, contain a vulnerability in which DM allowlist matching could be bypassed by exact-matching against sender display names and localparts without homeserver validation. Remote Matrix users can impersonate allowed identities by using attacker-controlled display names or matching localparts from different homeservers to reach the routing and agent pipeline.

PUBLISHED Reserved 2026-02-27 | Published 2026-03-05 | Updated 2026-03-06 | Assigner VulnCheck




MEDIUM: 6.3CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

Improper Authentication

Product status

Default status
unaffected

2026.1.14-1 (custom) before 2026.2.2
affected

Credits

@MegaManSec (https://joshua.hu) of AISLE Research Team reporter

References

github.com/...enclaw/security/advisories/GHSA-rmxw-jxxx-4cpc (GitHub Security Advisory (GHSA-rmxw-jxxx-4cpc)) vendor-advisory

github.com/...ommit/8f3bfbd1c4fb967a2ddb5b4b9a05784920814bcf (Patch Commit) patch

www.vulncheck.com/...homeserver-localpart-matching-in-matrix (VulnCheck Advisory: OpenClaw 2026.1.14-1 < 2026.2.2 - Allowlist Bypass via displayName and Cross-Homeserver localpart Matching in Matrix Plugin) third-party-advisory

cve.org (CVE-2026-28471)

nvd.nist.gov (CVE-2026-28471)

Download JSON