Cyber Posture

CVE-2026-28450

MediumPublic PoC

Published: 05 March 2026

Published
05 March 2026
Modified
11 March 2026
KEV Added
Patch
CVSS Score 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
EPSS Score 0.0012 30.3th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

OpenClaw versions prior to 2026.2.12 with the optional Nostr plugin enabled expose unauthenticated HTTP endpoints at /api/channels/nostr/:accountId/profile and /api/channels/nostr/:accountId/profile/import that allow reading and modifying Nostr profiles without gateway authentication. Remote attackers can exploit these endpoints to read sensitive profile data,…

more

modify Nostr profiles, persist malicious changes to gateway configuration, and publish signed Nostr events using the bot's private key when the gateway HTTP port is accessible beyond localhost.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly identifies and limits user actions performable without identification or authentication, preventing exploitation of the unauthenticated Nostr profile endpoints.

prevent

Enforces approved authorizations for logical access to information and resources, directly countering the missing authentication for reading and modifying profiles and configurations.

prevent

Monitors and controls communications at external boundaries, reducing exposure of the vulnerable HTTP endpoints accessible beyond localhost.

Security SummaryAI

CVE-2026-28450 is a missing authentication vulnerability (CWE-306) in OpenClaw versions prior to 2026.2.12 when the optional Nostr plugin is enabled. It exposes unauthenticated HTTP endpoints at /api/channels/nostr/:accountId/profile and /api/channels/nostr/:accountId/profile/import, allowing operations on Nostr profiles without gateway authentication. The issue carries a CVSS v3.1 base score of 6.8 (AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N) and was published on 2026-03-05.

Remote attackers can exploit these endpoints if the gateway HTTP port is accessible beyond localhost. Successful exploitation permits reading sensitive profile data, modifying Nostr profiles, persisting malicious changes to gateway configuration, and publishing signed Nostr events using the bot's private key.

Mitigation details are available in the OpenClaw GitHub security advisory (GHSA-mv9j-6xhh-g383) and the patch commit (647d929c9d0fd114249230d939a5cb3b36dc70e7), along with a VulnCheck advisory on the unauthenticated profile tampering via Nostr plugin HTTP endpoints. Affected users should update to OpenClaw 2026.2.12 or later to address the exposed endpoints.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.2.12

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability exposes unauthenticated HTTP endpoints in the OpenClaw gateway service, enabling remote exploitation of a public-facing application if the port is accessible beyond localhost, directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References