


Perceptive Security
SOC/SIEM Consultancy

OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misro…
Published:
4 March 2026 at 23:00:00
Alert date:
5 March 2026 at 23:13:13
Source:
nvd.nist.gov
Web Technologies, Identity & Access
OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component. The vulnerability allows cross-account policy context misrouting when multiple webhook targets share the same HTTP path. Attackers can exploit first-match request verification semantics to process inbound webhook events under incorrect account contexts. This bypasses intended allowlists and session policies, potentially leading to unauthorized access. The vulnerability affects the authentication and authorization mechanisms of the application.
Technical details
Mitigation steps:
Affected products:
OpenClaw
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-28469
https://github.com/openclaw/openclaw/commit/61d59a802869177d9cef52204767cd83357ab79e
https://github.com/openclaw/openclaw/security/advisories/GHSA-rq6g-px6m-c248
https://www.vulncheck.com/advisories/openclaw-cross-account-policy-context-misrouting-via-shared-webhook-path-ambiguity
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
