Cyber Posture

CVE-2026-28473

HighPublic PoC

Published: 05 March 2026

Published
05 March 2026
Modified
11 March 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0005 14.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-28473 is a high-severity Incorrect Authorization (CWE-863) vulnerability in Openclaw Openclaw. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 14.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-24 (Access Control Decisions) and AC-25 (Reference Monitor).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-3 enforces approved authorizations for access to resources, directly preventing the bypass of operator.approvals permission check via the /approve chat command invoking privileged RPC.

prevent

AC-25 implements a tamperproof reference monitor that mediates all accesses, ensuring no bypass paths like the internal privileged gateway client.

prevent

AC-24 authorizes access to exec.approval.resolve based on valid access control decisions, countering the unauthorized resolution allowed by operator.write scope alone.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Authz bypass on network-accessible service enables remote exploitation of public app (T1190) for privilege escalation (T1068) and unauthorized exec/command approvals (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenClaw versions prior to 2026.2.2 contain an authorization bypass vulnerability where clients with operator.write scope can approve or deny exec approval requests by sending the /approve chat command. The /approve command path invokes exec.approval.resolve through an internal privileged gateway client,…

more

bypassing the operator.approvals permission check that protects direct RPC calls.

Deeper analysisAI

CVE-2026-28473 is an authorization bypass vulnerability (CWE-863) affecting OpenClaw versions prior to 2026.2.2, published on 2026-03-05. It enables clients possessing the operator.write scope to approve or deny exec approval requests by issuing the /approve chat command. This command path invokes the exec.approval.resolve RPC through an internal privileged gateway client, circumventing the operator.approvals permission check that safeguards direct RPC calls. The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H).

An authenticated attacker with operator.write privileges can exploit this issue remotely over the network with low attack complexity and without requiring user interaction. By sending the /approve chat command, they can unauthorizedly resolve exec approval requests, granting them the ability to approve or deny executions that should require the stricter operator.approvals scope. This results in high impacts to integrity (I:H) and availability (A:H), potentially allowing manipulation of critical operations within the OpenClaw environment.

Mitigation is addressed in the referenced GitHub security advisory (GHSA-mqpw-46fh-299h) and the patching commit (efe2a464afcff55bb5a95b959e6bd9ec0fef086e), which resolve the bypass in OpenClaw version 2026.2.2 and later. The Vulncheck advisory (vulncheck.com/advisories/openclaw-authorization-bypass-via-approve-chat-command) provides additional details on the issue and recommends upgrading to the fixed version to prevent exploitation.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.2.2

CVEs Like This One

CVE-2026-42426Same product: Openclaw Openclaw
CVE-2026-32005Same product: Openclaw Openclaw
CVE-2026-41303Same product: Openclaw Openclaw
CVE-2026-28392Same product: Openclaw Openclaw
CVE-2026-32914Same product: Openclaw Openclaw
CVE-2026-33577Same product: Openclaw Openclaw
CVE-2026-32915Same product: Openclaw Openclaw
CVE-2026-31998Same product: Openclaw Openclaw
CVE-2026-42432Same product: Openclaw Openclaw
CVE-2026-41344Same product: Openclaw Openclaw

References