Cyber Posture

CVE-2026-28450

MediumPublic PoC

Published: 05 March 2026

Published
05 March 2026
Modified
11 March 2026
KEV Added
Patch
CVSS Score 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
EPSS Score 0.0012 31.0th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-28450 is a medium-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Openclaw Openclaw. Its CVSS base score is 6.8 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 31.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly identifies and limits user actions performable without identification or authentication, preventing exploitation of the unauthenticated Nostr profile endpoints.

prevent

Enforces approved authorizations for logical access to information and resources, directly countering the missing authentication for reading and modifying profiles and configurations.

prevent

Monitors and controls communications at external boundaries, reducing exposure of the vulnerable HTTP endpoints accessible beyond localhost.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability exposes unauthenticated HTTP endpoints in the OpenClaw gateway service, enabling remote exploitation of a public-facing application if the port is accessible beyond localhost, directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

OpenClaw versions prior to 2026.2.12 with the optional Nostr plugin enabled expose unauthenticated HTTP endpoints at /api/channels/nostr/:accountId/profile and /api/channels/nostr/:accountId/profile/import that allow reading and modifying Nostr profiles without gateway authentication. Remote attackers can exploit these endpoints to read sensitive profile data,…

more

modify Nostr profiles, persist malicious changes to gateway configuration, and publish signed Nostr events using the bot's private key when the gateway HTTP port is accessible beyond localhost.

Deeper analysisAI

CVE-2026-28450 is a missing authentication vulnerability (CWE-306) in OpenClaw versions prior to 2026.2.12 when the optional Nostr plugin is enabled. It exposes unauthenticated HTTP endpoints at /api/channels/nostr/:accountId/profile and /api/channels/nostr/:accountId/profile/import, allowing operations on Nostr profiles without gateway authentication. The issue carries a CVSS v3.1 base score of 6.8 (AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N) and was published on 2026-03-05.

Remote attackers can exploit these endpoints if the gateway HTTP port is accessible beyond localhost. Successful exploitation permits reading sensitive profile data, modifying Nostr profiles, persisting malicious changes to gateway configuration, and publishing signed Nostr events using the bot's private key.

Mitigation details are available in the OpenClaw GitHub security advisory (GHSA-mv9j-6xhh-g383) and the patch commit (647d929c9d0fd114249230d939a5cb3b36dc70e7), along with a VulnCheck advisory on the unauthenticated profile tampering via Nostr plugin HTTP endpoints. Affected users should update to OpenClaw 2026.2.12 or later to address the exposed endpoints.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.2.12

CVEs Like This One

CVE-2026-28472Same product: Openclaw Openclaw
CVE-2026-32041Same product: Openclaw Openclaw
CVE-2026-26319Same product: Openclaw Openclaw
CVE-2026-28446Same product: Openclaw Openclaw
CVE-2026-28485Same product: Openclaw Openclaw
CVE-2026-28465Same product: Openclaw Openclaw
CVE-2026-32004Same product: Openclaw Openclaw
CVE-2026-43580Same product: Openclaw Openclaw
CVE-2026-32974Same product: Openclaw Openclaw
CVE-2026-28458Same product: Openclaw Openclaw

References