Description
OpenClaw's Nextcloud Talk plugin versions prior to 2026.2.6 accept equality matching on the mutable actor.name display name field for allowlist validation, allowing attackers to bypass DM and room allowlists. An attacker can change their Nextcloud display name to match an allowlisted user ID and gain unauthorized access to restricted conversations.
Problem types
Product status
Any version before 2026.2.6
Credits
@MegaManSec (https://joshua.hu) of AISLE Research Team
References
github.com/...enclaw/security/advisories/GHSA-r5h9-vjqc-hq3r (GitHub Security Advisory (GHSA-r5h9-vjqc-hq3r))
github.com/...ommit/6b4b6049b47c3329a7014509594647826669892d (Patch Commit #1)
www.vulncheck.com/...ass-via-actorname-display-name-spoofing (VulnCheck Advisory: OpenClaw Nextcloud Talk < 2026.2.6 - Allowlist Bypass via actor.name Display Name Spoofing)