CVE-2026-28471
Bypass of DM Allowlist in OpenClaw Matrix Plugin Enables Impersonation
Publication date: 2026-03-05
Last updated on: 2026-03-11
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | From 2026.1.14-1 (inc) to 2026.2.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-287 | When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
OpenClaw version 2026.1.14-1 with the Matrix plugin installed and enabled has a vulnerability where the DM allowlist matching can be bypassed. This happens because the system matches sender display names and localparts exactly without validating the homeserver. As a result, remote Matrix users can impersonate allowed identities by using attacker-controlled display names or localparts from different homeservers to access routing and agent pipelines.
How can this vulnerability impact me? :
This vulnerability allows remote attackers to impersonate trusted identities by bypassing allowlist checks. This can lead to unauthorized access to routing and agent pipelines, potentially exposing sensitive information or allowing malicious actions within the affected system.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know