Cyber Posture

CVE-2026-28454

HighPublic PoC

Published: 05 March 2026

Published
05 March 2026
Modified
09 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0004 11.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-28454 is a high-severity Insufficient Verification of Data Authenticity (CWE-345) vulnerability in Openclaw Openclaw. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 11.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-345

Directly requires independent verification of matching output before adverse decisions, mitigating insufficient authenticity checks on data from external sources.

addresses: CWE-345

Use of approved PKI certificates provides verifiable data authenticity and origin for communications and artifacts.

addresses: CWE-345

Mandates provision of authenticity and integrity artifacts that enable verification of name/address resolution data.

addresses: CWE-345

Requires explicit verification of data authenticity from authoritative sources, preventing acceptance of unauthenticated resolution responses.

addresses: CWE-345

Control requires verification of data authenticity/integrity (e.g., checksums) after aggregation/packing, directly reducing exploitation of insufficient verification before transmission.

addresses: CWE-345

Time synchronization supports reliable freshness verification when checking data authenticity across systems or components.

addresses: CWE-345

Mandates verification of data authenticity for software, firmware, and information.

addresses: CWE-345

Provenance documentation and monitoring directly enables verification of authenticity for components and data throughout their history.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Vuln enables remote unauth exploitation of exposed webhook (T1190) to bypass allowlists and execute privileged bot commands (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenClaw versions prior to 2026.2.2 fail to validate webhook secrets in Telegram webhook mode (must be enabled), allowing unauthenticated HTTP POST requests to the webhook endpoint that trust attacker-controlled JSON payloads. Remote attackers can forge Telegram updates by spoofing message.from.id…

more

and chat.id fields to bypass sender allowlists and execute privileged bot commands.

Deeper analysisAI

CVE-2026-28454 affects OpenClaw versions prior to 2026.2.2, specifically in Telegram webhook mode, which must be explicitly enabled. The vulnerability stems from a failure to validate webhook secrets, permitting unauthenticated HTTP POST requests to the webhook endpoint that processes attacker-controlled JSON payloads without verification. This issue, classified under CWE-345 (Insufficient Verification of Data Authenticity), has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), highlighting high integrity impact from network-accessible exploitation with low complexity and no privileges required.

Remote, unauthenticated attackers can exploit this by sending crafted HTTP POST requests to the exposed webhook endpoint, forging Telegram update payloads. By spoofing fields such as message.from.id and chat.id, attackers bypass sender allowlists, enabling execution of privileged bot commands that would otherwise be restricted.

Mitigation details are outlined in the GitHub security advisory (GHSA-fhvm-j76f-qmjv) and related commits, which patch the validation of webhook secrets. Security practitioners should upgrade to OpenClaw version 2026.2.2 or later, where the commits (3cbcba10cf30c2ffb898f0d8c7dfb929f15f8930, 5643a934799dc523ec2ef18c007e1aa2c386b670, 633fe8b9c17f02fcc68ecdb5ec212a5ace932f09, ca92597e1f9593236ad86810b66633144b69314d) address the flaw by enforcing proper secret checks in Telegram webhook mode.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.2.2

CVEs Like This One

CVE-2026-43534Same product: Openclaw Openclaw
CVE-2026-35650Same product: Openclaw Openclaw
CVE-2026-41303Same product: Openclaw Openclaw
CVE-2026-42423Same product: Openclaw Openclaw
CVE-2026-25474Same product: Openclaw Openclaw
CVE-2026-28470Same product: Openclaw Openclaw
CVE-2026-29607Same product: Openclaw Openclaw
CVE-2026-28473Same product: Openclaw Openclaw
CVE-2026-28450Same product: Openclaw Openclaw
CVE-2026-28448Same product: Openclaw Openclaw

References