Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-rq6g-px6m-c248 | OpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misrouting |
Mon, 09 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 05 Mar 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets share the same HTTP path. Attackers can exploit first-match request verification semantics to process inbound webhook events under incorrect account contexts, bypassing intended allowlists and session policies. | |
| Title | OpenClaw < 2026.2.14 - Cross-Account Policy Context Misrouting via Shared Webhook Path Ambiguity | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-639 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-09T18:02:19.456Z
Reserved: 2026-02-27T19:19:10.890Z
Link: CVE-2026-28469
Updated: 2026-03-09T18:02:13.901Z
Status : Analyzed
Published: 2026-03-05T22:16:20.407
Modified: 2026-03-09T20:29:33.457
Link: CVE-2026-28469
No data.
OpenCVE Enrichment
Updated: 2026-04-17T12:45:16Z
Github GHSA