Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @openclaw/nextcloud-talk
  4. ›
  5. GHSA-r5h9-vjqc-hq3r

GHSA-r5h9-vjqc-hq3r: Nextcloud Talk allowlist bypass via actor.name display name spoofing

February 17, 2026

In affected versions of the optional Nextcloud Talk plugin (installed separately; not bundled with the core OpenClaw install), an untrusted webhook field (actor.name, display name) could be treated as an allowlist identifier. An attacker could change their Nextcloud display name to match an allowlisted user ID and bypass DM or room allowlists.

References

  • github.com/advisories/GHSA-r5h9-vjqc-hq3r
  • github.com/openclaw/openclaw
  • github.com/openclaw/openclaw/commit/660f87278c9f292061e097441e0b10c20d62b31b
  • github.com/openclaw/openclaw/commit/6b4b6049b47c3329a7014509594647826669892d
  • github.com/openclaw/openclaw/releases/tag/v2026.2.3
  • github.com/openclaw/openclaw/security/advisories/GHSA-r5h9-vjqc-hq3r

Code Behaviors & Features

Detect and mitigate GHSA-r5h9-vjqc-hq3r with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2026.2.6

Fixed versions

  • 2026.2.6

Solution

Upgrade to version 2026.2.6 or above.

Impact 9.1 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-290: Authentication Bypass by Spoofing

Source file

npm/@openclaw/nextcloud-talk/GHSA-r5h9-vjqc-hq3r.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 25 Mar 2026 00:17:01 +0000.