Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-pchc-86f6-8758 | OpenClaw BlueBubbles webhook auth bypass via loopback proxy trust |
Tue, 24 Feb 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* |
Fri, 20 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openclaw
Openclaw @openclaw/bluebubbles Openclaw openclaw |
|
| Vendors & Products |
Openclaw
Openclaw @openclaw/bluebubbles Openclaw openclaw |
Thu, 19 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw is a personal AI assistant. Prior to 2026.2.13, the optional BlueBubbles iMessage channel plugin could accept webhook requests as authenticated based only on the TCP peer address being loopback (`127.0.0.1`, `::1`, `::ffff:127.0.0.1`) even when the configured webhook secret was missing or incorrect. This does not affect the default iMessage integration unless BlueBubbles is installed and enabled. Version 2026.2.13 contains a patch. Other mitigations include setting a non-empty BlueBubbles webhook password and avoiding deployments where a public-facing reverse proxy forwards to a loopback-bound Gateway without strong upstream authentication. | |
| Title | OpenClaw has BlueBubbles webhook auth bypass via loopback proxy trust | |
| Weaknesses | CWE-863 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-20T15:41:50.888Z
Reserved: 2026-02-13T16:27:51.807Z
Link: CVE-2026-26316
Updated: 2026-02-20T15:32:10.864Z
Status : Analyzed
Published: 2026-02-19T22:16:47.110
Modified: 2026-02-24T19:59:36.100
Link: CVE-2026-26316
No data.
OpenCVE Enrichment
Updated: 2026-04-18T11:45:44Z
Github GHSA