Home

Description

OpenClaw versions prior to 2026.2.14 contain an oauth state validation bypass vulnerability in the manual Chutes login flow that allows attackers to bypass CSRF protection. An attacker can convince a user to paste attacker-controlled OAuth callback data, enabling credential substitution and token persistence for unauthorized accounts.

PUBLISHED Reserved 2026-02-27 | Published 2026-03-05 | Updated 2026-03-09 | Assigner VulnCheck




MEDIUM: 5.9CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N

HIGH: 7.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N

Problem types

Cross-Site Request Forgery (CSRF)

Product status

Default status
unaffected

Any version before 2026.2.14
affected

Credits

Aether AI (@aether-ai-agent) reporter

References

github.com/...enclaw/security/advisories/GHSA-7rcp-mxpq-72pj (GitHub Security Advisory (GHSA-7rcp-mxpq-72pj)) vendor-advisory

github.com/...ommit/a99ad11a4107ba8eac58f54a3c1a8a0cf5686f47 (Patch Commit) patch

www.vulncheck.com/...tion-bypass-in-manual-chutes-login-flow (VulnCheck Advisory: OpenClaw < 2026.2.14 - OAuth State Validation Bypass in Manual Chutes Login Flow) third-party-advisory

cve.org (CVE-2026-28477)

nvd.nist.gov (CVE-2026-28477)

Download JSON