CVE-2026-26316

OpenClaw is a personal AI assistant. Prior to 2026.2.13, the optional BlueBubbles iMessage channel plugin could accept webhook requests as authenticated based only on the TCP peer address being loopback (`127.0.0.1`, `::1`, `::ffff:127.0.0.1`) even when the configured webhook secret was missing or incorrect. This does not affect the default iMessage integration unless BlueBubbles is installed and enabled. Version 2026.2.13 contains a patch. Other mitigations include setting a non-empty BlueBubbles webhook password and avoiding deployments where a public-facing reverse proxy forwards to a loopback-bound Gateway without strong upstream authentication.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

24 Feb 2026, 19:59

Type Values Removed Values Added
References () https://github.com/openclaw/openclaw/commit/743f4b28495cdeb0d5bf76f6ebf4af01f6a02e5a - () https://github.com/openclaw/openclaw/commit/743f4b28495cdeb0d5bf76f6ebf4af01f6a02e5a - Patch
References () https://github.com/openclaw/openclaw/commit/f836c385ffc746cb954e8ee409f99d079bfdcd2f - () https://github.com/openclaw/openclaw/commit/f836c385ffc746cb954e8ee409f99d079bfdcd2f - Patch
References () https://github.com/openclaw/openclaw/releases/tag/v2026.2.13 - () https://github.com/openclaw/openclaw/releases/tag/v2026.2.13 - Product, Release Notes
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-pchc-86f6-8758 - () https://github.com/openclaw/openclaw/security/advisories/GHSA-pchc-86f6-8758 - Patch, Vendor Advisory
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw openclaw
Openclaw
Summary
  • (es) OpenClaw es un asistente personal de IA. Antes de 2026.2.13, el plugin opcional del canal iMessage de BlueBubbles podía aceptar solicitudes de webhook como autenticadas basándose únicamente en que la dirección de par TCP fuera de bucle invertido ('127.0.0.1', '::1', '::ffff:127.0.0.1') incluso cuando el secreto de webhook configurado faltaba o era incorrecto. Esto no afecta a la integración predeterminada de iMessage a menos que BlueBubbles esté instalado y habilitado. La versión 2026.2.13 contiene un parche. Otras mitigaciones incluyen establecer una contraseña de webhook de BlueBubbles no vacía y evitar implementaciones donde un proxy inverso de cara al público reenvíe a un Gateway vinculado a loopback sin una fuerte autenticación ascendente.

19 Feb 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-19 22:16

Updated : 2026-02-24 19:59


NVD link : CVE-2026-26316

Mitre link : CVE-2026-26316

CVE.ORG link : CVE-2026-26316


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-863

Incorrect Authorization