Cyber Posture

CVE-2026-28469

HighPublic PoC

Published: 05 March 2026

Published
05 March 2026
Modified
09 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0004 12.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-28469 is a high-severity Authorization Bypass Through User-Controlled Key (CWE-639) vulnerability in Openclaw Openclaw. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 12.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-639

Per-request decision making makes it harder to bypass authorization using user-controlled keys without proper validation in the decision process.

addresses: CWE-639

Consistent enforcement of approved authorizations makes bypassing via user-controlled keys ineffective.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability allows unauthenticated network attackers to send crafted requests to a public-facing Google Chat webhook endpoint, exploiting routing/authorization logic to bypass allowlists and session policies under incorrect account contexts. This directly matches exploitation of a public-facing application for initial access or unauthorized processing.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets share the same HTTP path. Attackers can exploit first-match request verification semantics to process…

more

inbound webhook events under incorrect account contexts, bypassing intended allowlists and session policies.

Deeper analysisAI

OpenClaw versions prior to 2026.2.14 are affected by CVE-2026-28469, a webhook routing vulnerability in the Google Chat monitor component. The issue arises from cross-account policy context misrouting when multiple webhook targets share the same HTTP path. It exploits first-match request verification semantics, enabling inbound webhook events to be processed under incorrect account contexts and bypassing intended allowlists and session policies. The vulnerability is rated with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) and is associated with CWE-639 (Authorization Bypass Through User-Controlled Key).

Unauthenticated attackers with network access can exploit this vulnerability by sending crafted webhook requests to the affected Google Chat monitor endpoint. Due to the low attack complexity and lack of required privileges or user interaction, exploitation involves targeting shared HTTP paths across accounts. Successful exploitation allows attackers to process webhook events in the context of a different account, achieving integrity impacts such as unauthorized policy bypasses without affecting confidentiality or availability.

Mitigation is addressed in OpenClaw version 2026.2.14 and later, as detailed in the project's GitHub commit (61d59a802869177d9cef52204767cd83357ab79e). Security advisories from GitHub (GHSA-rq6g-px6m-c248) and VulnCheck provide further guidance on the issue and recommend upgrading to patched versions to resolve the routing ambiguity.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.2.14

CVEs Like This One

CVE-2026-28465Same product: Openclaw Openclaw
CVE-2026-31998Same product: Openclaw Openclaw
CVE-2026-32975Same product: Openclaw Openclaw
CVE-2026-35629Same product: Openclaw Openclaw
CVE-2026-22171Same product: Openclaw Openclaw
CVE-2026-31989Same product: Openclaw Openclaw
CVE-2026-35622Same product: Openclaw Openclaw
CVE-2026-41912Same product: Openclaw Openclaw
CVE-2026-42439Same product: Openclaw Openclaw
CVE-2026-28472Same product: Openclaw Openclaw

References