Cyber Posture

CVE-2026-28465

MediumPublic PoC

Published: 05 March 2026

Published
05 March 2026
Modified
10 March 2026
KEV Added
Patch
CVSS Score 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0013 32.2th percentile
Risk Priority 12 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-28465 is a medium-severity Authentication Bypass by Spoofing (CWE-290) vulnerability in Openclaw Openclaw. Its CVSS base score is 5.9 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 32.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-290

Reveals spoofed logon attempts through unexpected previous logon timestamps upon legitimate login.

addresses: CWE-290

Training specifically addresses recognizing spoofed communications and phishing that enable authentication bypass.

addresses: CWE-290

Requiring verifiable identity evidence at appropriate assurance levels makes it substantially harder for attackers to successfully spoof or impersonate users to obtain accounts.

addresses: CWE-290

Unique device authentication makes successful spoofing of device identity substantially more difficult to achieve.

addresses: CWE-290

Unique identification of non-organizational users reduces the feasibility of authentication bypass by spoofing.

addresses: CWE-290

Unique identification and authentication of services before communications makes spoofing of service identities substantially harder.

addresses: CWE-290

Isolated trusted path ensures the user interacts only with genuine system components, preventing spoofing of authentication interfaces or prompts.

addresses: CWE-290

Directly counters DNS response spoofing by requiring cryptographic origin authentication artifacts from the authoritative source.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CVE describes an authentication bypass in a publicly accessible webhook endpoint (via untrusted X-Forwarded-* headers in a reverse-proxy setup), which directly matches the definition of exploiting a public-facing application to gain unauthorized access and spoof events.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenClaw's voice-call plugin versions before 2026.2.3 contain an improper authentication vulnerability in webhook verification that allows remote attackers to bypass verification by supplying untrusted forwarded headers. Attackers can spoof webhook events by manipulating Forwarded or X-Forwarded-* headers in reverse-proxy configurations…

more

that implicitly trust these headers.

Deeper analysisAI

CVE-2026-28465, published on 2026-03-05, is an improper authentication vulnerability (CWE-290) in the webhook verification mechanism of OpenClaw's voice-call plugin. Versions of the plugin prior to 2026.2.3 trust untrusted forwarded headers, such as Forwarded or X-Forwarded-* headers, enabling remote attackers to bypass authentication checks. This issue arises in reverse-proxy configurations that implicitly pass and trust these headers without proper validation.

Remote, unauthenticated attackers (PR:N) with network access (AV:N) can exploit the vulnerability by manipulating the affected headers in HTTP requests forwarded through a misconfigured proxy. Exploitation requires high complexity (AC:H) and no user interaction (UI:N), allowing attackers to spoof webhook events. Successful exploitation results in high integrity impact (I:H) with no confidentiality or availability effects (C:N/A:N) and unchanged scope (S:U), as reflected in the CVSS v3.1 base score of 5.9.

Mitigation is addressed in OpenClaw's GitHub security advisory (GHSA-3m3q-x3gj-f79x) and a specific commit (a749db9820eb6d6224032a5a34223d286d2dcc2f) that patches the verification logic. Security practitioners should update the voice-call plugin to version 2026.2.3 or later. Additional details on the bypass via forwarded headers are provided in the VulnCheck advisory.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.2.3

CVEs Like This One

CVE-2026-35622Same product: Openclaw Openclaw
CVE-2026-32045Same product: Openclaw Openclaw
CVE-2026-31998Same product: Openclaw Openclaw
CVE-2026-32975Same product: Openclaw Openclaw
CVE-2026-35629Same product: Openclaw Openclaw
CVE-2026-22171Same product: Openclaw Openclaw
CVE-2026-31989Same product: Openclaw Openclaw
CVE-2026-41912Same product: Openclaw Openclaw
CVE-2026-42439Same product: Openclaw Openclaw
CVE-2026-28472Same product: Openclaw Openclaw

References