CVE-2026-28477

7.1 HIGH

📋 TL;DR

OpenClaw versions before 2026.2.14 have an OAuth state validation bypass in the manual Chutes login flow that allows attackers to bypass CSRF protection. Attackers can trick users into pasting malicious OAuth callback data, enabling credential substitution and unauthorized account token persistence. This affects all OpenClaw users with manual Chutes login enabled.

💻 Affected Systems

Products:
  • OpenClaw
Versions: All versions prior to 2026.2.14
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with manual Chutes login flow enabled. Automatic OAuth flows are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain persistent access to user accounts, potentially compromising sensitive data and performing unauthorized actions on behalf of legitimate users.

🟠

Likely Case

Attackers hijack user sessions, access account data, and potentially perform limited unauthorized actions within the compromised accounts.

🟢

If Mitigated

With proper input validation and CSRF protections, the attack would fail, maintaining normal authentication security.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires social engineering to convince users to paste malicious data. No authentication needed for initial attack vector.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2026.2.14

Vendor Advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-7rcp-mxpq-72pj

Restart Required: Yes

Instructions:

1. Update OpenClaw to version 2026.2.14 or later. 2. Restart the OpenClaw service. 3. Verify the update was successful.

🔧 Temporary Workarounds

Disable manual Chutes login

linux

Temporarily disable the vulnerable manual Chutes login flow until patching is complete

openclaw config set chutes.manual_login false
systemctl restart openclaw

🧯 If You Can't Patch

  • Implement strict input validation for OAuth callback parameters
  • Add additional CSRF tokens and validation for all authentication flows

🔍 How to Verify

Check if Vulnerable:

Check OpenClaw version with 'openclaw --version'. If version is below 2026.2.14 and manual Chutes login is enabled, the system is vulnerable.

Check Version:

openclaw --version

Verify Fix Applied:

Verify version is 2026.2.14 or higher with 'openclaw --version' and test manual Chutes login flow with invalid state parameters.

📡 Detection & Monitoring

Log Indicators:

  • Failed OAuth state validation attempts
  • Multiple authentication attempts from same IP with different OAuth states
  • Unusual OAuth callback patterns

Network Indicators:

  • HTTP requests with manipulated OAuth state parameters
  • Unusual OAuth callback traffic patterns

SIEM Query:

source="openclaw" AND (event="oauth_failure" OR event="state_validation_failed")

🔗 References

📤 Share & Export