Home

Description

OpenClaw's Nextcloud Talk plugin versions prior to 2026.2.6 accept equality matching on the mutable actor.name display name field for allowlist validation, allowing attackers to bypass DM and room allowlists. An attacker can change their Nextcloud display name to match an allowlisted user ID and gain unauthorized access to restricted conversations.

PUBLISHED Reserved 2026-02-27 | Published 2026-03-05 | Updated 2026-03-05 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

Incorrect Authorization

Product status

Default status
unaffected

Any version before 2026.2.6
affected

Credits

@MegaManSec (https://joshua.hu) of AISLE Research Team reporter

References

github.com/...enclaw/security/advisories/GHSA-r5h9-vjqc-hq3r (GitHub Security Advisory (GHSA-r5h9-vjqc-hq3r)) vendor-advisory

github.com/...ommit/6b4b6049b47c3329a7014509594647826669892d (Patch Commit #1) patch

www.vulncheck.com/...ass-via-actorname-display-name-spoofing (VulnCheck Advisory: OpenClaw Nextcloud Talk < 2026.2.6 - Allowlist Bypass via actor.name Display Name Spoofing) third-party-advisory

cve.org (CVE-2026-28474)

nvd.nist.gov (CVE-2026-28474)

Download JSON