CVE-2026-28469: OpenClaw
CVE-2026-28469
OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets shar...
Overview
A critical security vulnerability has been identified in the OpenClaw platform’s Google Chat monitor component. This flaw could allow an attacker to reroute security alerts and data to an unauthorized account, bypassing critical security controls.
Vulnerability Explained
In simple terms, the vulnerability exists in how OpenClaw handles incoming alert messages (called webhooks) from Google Chat. When multiple OpenClaw customer accounts are configured to receive alerts at the same web address, the software can incorrectly route an incoming message to the wrong account. This happens due to a flaw in the “first-match” logic used to verify these requests.
Imagine a postal service that, upon receiving a letter for “Apartment 5B,” simply delivers it to the first “Apartment 5” it finds in the building, regardless of the building’s actual street address. Similarly, this bug causes a security alert intended for one company’s OpenClaw account to be processed under another company’s security policies and permissions.
Potential Impact
The impact of this vulnerability is severe. A successful exploit could allow an attacker to:
- Bypass Security Policies: Security alerts (like intrusion attempts or data leaks) could be processed under the wrong account’s rules, potentially causing them to be ignored or hidden from the legitimate security team.
- Gain Unauthorized Access to Data: Sensitive information contained within these alert messages could be disclosed to an unauthorized party.
- Disrupt Security Monitoring: Critical alerts could be misrouted and lost, creating a blind spot in an organization’s security defenses and delaying response to real incidents.
This vulnerability received a CVSS score of 9.8 (CRITICAL) due to the low attack complexity and high impact on confidentiality, integrity, and availability.
Remediation and Mitigation
Immediate Action Required:
- Upgrade: All users of OpenClaw must immediately upgrade to version 2026.2.14 or later. This version contains the necessary patch to properly validate and route webhook requests to the correct account context.
- Verify Configuration: After upgrading, administrators should audit their Google Chat monitor webhook configurations to ensure all endpoints are uniquely defined and functioning as intended.
Temporary Mitigation (If Upgrade is Delayed): If an immediate upgrade is not possible, consider the following temporary workarounds while prioritizing the patch:
- Isolate Webhook Paths: Review and reconfigure webhook targets to ensure no two accounts or critical systems share an identical incoming webhook URL path.
- Increase Monitoring: Closely monitor alert logs and investigation queues for any unexpected gaps in alerts or the appearance of alerts from unfamiliar sources.
You should apply the patch as soon as possible, as the temporary measures do not fully eliminate the risk of exploitation.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-28469?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
Object lifecycle issue in DevTools in Google Chrome prior to 145.0.7632.159 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a craft...
The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.8.6 via the ...
WWBN AVideo is an open source video platform. Prior to version 26.0, the `setPassword.json.php` endpoint in the CustomizeUser plugin allows administrators to set a channel password for any user. Due t...
SAPIDO RB-1732 V2.0.43 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands by submitting malicious input to the formSysCmd endp...
Other Google Vulnerabilities
Object lifecycle issue in DevTools in Google Chrome prior to 145.0.7632.159 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a craft...
The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.8.6 via the ...