A critical vulnerability, CVE-2026-28474, affects OpenClaw's Nextcloud Talk plugin. This flaw allows attackers to bypass allowlist restrictions by spoofing display names. Users of affected versions are at risk, and an immediate patch to version 2026.2.6 is available.
This is a critical vulnerability with a CVSS score of 9.8, indicating extreme risk.
What is Openclaw?
CVE-2026-28474: OpenClaw Nextcloud Talk Allowlist Bypass
Critical vulnerability, requiring immediate attention.
EPSS score of 0.052 indicates a low probability of exploitation.
The vulnerability stems from improper validation of user identities against allowlists. An attacker can change their display name to match a user ID on the allowlist, thereby gaining unauthorized access to direct messages and restricted rooms.
How to fix CVE-2026-28474 in Openclaw
Patch immediately- 1.Update the OpenClaw Nextcloud Talk plugin to version 2026.2.6 or later.
composer update openclawWorkaround: There is no known workaround. Applying the patch is the only way to remediate this vulnerability.
NextGuard automatically flags CVE-2026-28474 if Openclaw appears in any of your monitored projects — no manual lookup required.
Stay ahead of php vulnerabilities
Proactively detect and respond to php security threats. Use NextGuard to monitor your php dependencies and receive real-time alerts.
Compare PlansFrequently asked questions
This vulnerability poses a significant risk to Nextcloud Talk installations using OpenClaw. Ensure you update to version 2026.2.6 immediately to mitigate the risk of unauthorized access. You can see all php vulnerabilities on our platform.
Related topics