LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-28454

CVE-2026-28454 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: March 5, 2026

OpenClaw - Authentication Bypass

Published: March 5, 2026Updated: March 5, 2026Remote Exploitable

Overview

OpenClaw < 2026.2.2 contains a broken authentication caused by failure to validate webhook secrets in Telegram webhook mode, letting remote attackers spoof Telegram updates and execute privileged bot commands, exploit requires Telegram webhook mode enabled.

Severity & Score

Severity: Critical
CVSS Score: 9.8

Impact

Remote attackers can bypass sender allowlists and execute privileged bot commands, potentially compromising bot control.

Mitigation

Update to version 2026.2.2 or later.

Details

CVE ID
CVE-2026-28454
Severity
Critical
CVSS Score
9.8
Type
broken_authentication
Status
new

CWE

  • CWE-345

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H