CVE-2026-28477
📋 TL;DR
OpenClaw versions before 2026.2.14 have an OAuth state validation bypass in the manual Chutes login flow that allows attackers to bypass CSRF protection. Attackers can trick users into pasting malicious OAuth callback data, enabling credential substitution and unauthorized account token persistence. This affects all OpenClaw users with manual Chutes login enabled.
💻 Affected Systems
- OpenClaw
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain persistent access to user accounts, potentially compromising sensitive data and performing unauthorized actions on behalf of legitimate users.
Likely Case
Attackers hijack user sessions, access account data, and potentially perform limited unauthorized actions within the compromised accounts.
If Mitigated
With proper input validation and CSRF protections, the attack would fail, maintaining normal authentication security.
🎯 Exploit Status
Requires social engineering to convince users to paste malicious data. No authentication needed for initial attack vector.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2026.2.14
Vendor Advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-7rcp-mxpq-72pj
Restart Required: Yes
Instructions:
1. Update OpenClaw to version 2026.2.14 or later. 2. Restart the OpenClaw service. 3. Verify the update was successful.
🔧 Temporary Workarounds
Disable manual Chutes login
linuxTemporarily disable the vulnerable manual Chutes login flow until patching is complete
openclaw config set chutes.manual_login false
systemctl restart openclaw
🧯 If You Can't Patch
- Implement strict input validation for OAuth callback parameters
- Add additional CSRF tokens and validation for all authentication flows
🔍 How to Verify
Check if Vulnerable:
Check OpenClaw version with 'openclaw --version'. If version is below 2026.2.14 and manual Chutes login is enabled, the system is vulnerable.
Check Version:
openclaw --version
Verify Fix Applied:
Verify version is 2026.2.14 or higher with 'openclaw --version' and test manual Chutes login flow with invalid state parameters.
📡 Detection & Monitoring
Log Indicators:
- Failed OAuth state validation attempts
- Multiple authentication attempts from same IP with different OAuth states
- Unusual OAuth callback patterns
Network Indicators:
- HTTP requests with manipulated OAuth state parameters
- Unusual OAuth callback traffic patterns
SIEM Query:
source="openclaw" AND (event="oauth_failure" OR event="state_validation_failed")