CVE-2026-28450
Published: 05 March 2026
Description
OpenClaw versions prior to 2026.2.12 with the optional Nostr plugin enabled expose unauthenticated HTTP endpoints at /api/channels/nostr/:accountId/profile and /api/channels/nostr/:accountId/profile/import that allow reading and modifying Nostr profiles without gateway authentication. Remote attackers can exploit these endpoints to read sensitive profile data,…
more
modify Nostr profiles, persist malicious changes to gateway configuration, and publish signed Nostr events using the bot's private key when the gateway HTTP port is accessible beyond localhost.
Mitigating Controls (NIST 800-53 r5)AI
Directly identifies and limits user actions performable without identification or authentication, preventing exploitation of the unauthenticated Nostr profile endpoints.
Enforces approved authorizations for logical access to information and resources, directly countering the missing authentication for reading and modifying profiles and configurations.
Monitors and controls communications at external boundaries, reducing exposure of the vulnerable HTTP endpoints accessible beyond localhost.
Security SummaryAI
CVE-2026-28450 is a missing authentication vulnerability (CWE-306) in OpenClaw versions prior to 2026.2.12 when the optional Nostr plugin is enabled. It exposes unauthenticated HTTP endpoints at /api/channels/nostr/:accountId/profile and /api/channels/nostr/:accountId/profile/import, allowing operations on Nostr profiles without gateway authentication. The issue carries a CVSS v3.1 base score of 6.8 (AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N) and was published on 2026-03-05.
Remote attackers can exploit these endpoints if the gateway HTTP port is accessible beyond localhost. Successful exploitation permits reading sensitive profile data, modifying Nostr profiles, persisting malicious changes to gateway configuration, and publishing signed Nostr events using the bot's private key.
Mitigation details are available in the OpenClaw GitHub security advisory (GHSA-mv9j-6xhh-g383) and the patch commit (647d929c9d0fd114249230d939a5cb3b36dc70e7), along with a VulnCheck advisory on the unauthenticated profile tampering via Nostr plugin HTTP endpoints. Affected users should update to OpenClaw 2026.2.12 or later to address the exposed endpoints.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability exposes unauthenticated HTTP endpoints in the OpenClaw gateway service, enabling remote exploitation of a public-facing application if the port is accessible beyond localhost, directly mapping to T1190: Exploit Public-Facing Application.