Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. openclaw
  4. ›
  5. CVE-2026-28450

CVE-2026-28450: OpenClaw's unauthenticated Nostr profile HTTP endpoints allow remote profile/config tampering

February 17, 2026 (updated March 6, 2026)

The OpenClaw Nostr channel plugin (optional, disabled by default, installed separately) exposes profile management HTTP endpoints under /api/channels/nostr/:accountId/profile (GET/PUT) and /api/channels/nostr/:accountId/profile/import (POST). In affected versions, these routes were dispatched via the gateway plugin HTTP layer without requiring gateway authentication, allowing unauthenticated remote callers to read or mutate the Nostr profile and persist changes to the gateway config. Profile updates are also published as a signed Nostr kind:0 event using the bot’s private key.

Deployments that do not have the Nostr plugin installed and enabled are not impacted.

References

  • github.com/advisories/GHSA-mv9j-6xhh-g383
  • github.com/openclaw/openclaw
  • github.com/openclaw/openclaw/commit/647d929c9d0fd114249230d939a5cb3b36dc70e7
  • github.com/openclaw/openclaw/releases/tag/v2026.2.12
  • github.com/openclaw/openclaw/security/advisories/GHSA-mv9j-6xhh-g383
  • nvd.nist.gov/vuln/detail/CVE-2026-28450
  • www.vulncheck.com/advisories/openclaw-unauthenticated-profile-tampering-via-nostr-plugin-http-endpoints

Code Behaviors & Features

Detect and mitigate CVE-2026-28450 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2026.2.12

Fixed versions

  • 2026.2.12

Solution

Upgrade to version 2026.2.12 or above.

Impact 6.2 MEDIUM

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-285: Improper Authorization
  • CWE-306: Missing Authentication for Critical Function

Source file

npm/openclaw/CVE-2026-28450.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:17:37 +0000.