CVE-2026-28480

6.5 MEDIUM

📋 TL;DR

OpenClaw versions before 2026.2.14 have an authorization bypass vulnerability where Telegram allowlist matching uses mutable usernames instead of immutable numeric sender IDs. Attackers can spoof identities by obtaining recycled usernames to bypass allowlist restrictions and interact with bots as unauthorized senders. This affects all OpenClaw deployments using Telegram allowlist functionality.

💻 Affected Systems

Products:
  • OpenClaw
Versions: All versions prior to 2026.2.14
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using Telegram allowlist functionality with username-based matching.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized access to sensitive bot functionality, potentially accessing confidential data, executing privileged commands, or manipulating bot operations.

🟠

Likely Case

Unauthorized users bypass allowlist restrictions to interact with bots, potentially accessing features intended only for authorized personnel.

🟢

If Mitigated

With proper controls, impact is limited to unauthorized access to non-sensitive bot features.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires obtaining a recycled username that matches an allowlist entry.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2026.2.14

Vendor Advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-mj5r-hh7j-4gxf

Restart Required: Yes

Instructions:

1. Update OpenClaw to version 2026.2.14 or later. 2. Restart the OpenClaw service. 3. Verify the fix by checking logs for proper numeric ID matching.

🔧 Temporary Workarounds

Switch to numeric ID allowlist

all

Manually convert all allowlist entries from usernames to numeric Telegram IDs

# Edit OpenClaw configuration to use numeric IDs instead of usernames in allowlist

Disable Telegram allowlist functionality

all

Temporarily disable allowlist feature until patched

# Set allowlist_enabled: false in OpenClaw configuration

🧯 If You Can't Patch

  • Implement additional authentication layer for sensitive bot commands
  • Monitor logs for unusual username changes or allowlist bypass attempts

🔍 How to Verify

Check if Vulnerable:

Check OpenClaw version and verify if using username-based Telegram allowlist matching

Check Version:

openclaw --version

Verify Fix Applied:

Test that numeric Telegram IDs are now required for allowlist matching

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized username accessing allowlist-protected features
  • Username changes matching allowlist entries

Network Indicators:

  • Telegram API calls from unexpected usernames to protected endpoints

SIEM Query:

source="openclaw" AND (event="allowlist_bypass" OR username_change_detected)

🔗 References

📤 Share & Export