Metrics
Affected Vendors & Products
Mon, 09 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Mar 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 05 Mar 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.2.14 contain an authorization bypass vulnerability where Telegram allowlist matching accepts mutable usernames instead of immutable numeric sender IDs. Attackers can spoof identity by obtaining recycled usernames to bypass allowlist restrictions and interact with bots as unauthorized senders. | |
| Title | OpenClaw < 2026.2.14 - Identity Spoofing via Mutable Username in Telegram Allowlist Authorization | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-290 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-03-05T21:59:55.589Z
Updated: 2026-03-09T20:58:49.810Z
Reserved: 2026-02-27T19:20:32.111Z
Link: CVE-2026-28480
Updated: 2026-03-09T20:58:46.361Z
Status : Awaiting Analysis
Published: 2026-03-05T22:16:22.610
Modified: 2026-03-09T13:36:08.413
Link: CVE-2026-28480
No data.
ReportizFlow