OpenClaw versions prior to 2026.2.14 contain an authorization bypass vulnerability where Telegram allowlist matching accepts mutable usernames instead of immutable numeric sender IDs. Attackers can spoof identity by obtaining recycled usernames to bypass allowlist restrictions and interact with bots as unauthorized senders.
References
Configurations
No configuration.
History
09 Mar 2026, 13:36
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
05 Mar 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
05 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-05 22:16
Updated : 2026-03-09 13:36
NVD link : CVE-2026-28480
Mitre link : CVE-2026-28480
CVE.ORG link : CVE-2026-28480
JSON object : View
Products Affected
No product.
CWE
CWE-290
Authentication Bypass by Spoofing
