CVE-2026-28474

OpenClaw · Nextcloud Talk plugin

OpenClaw's Nextcloud Talk plugin uses mutable display names for allowlist validation. Attackers can bypass access controls by changing their display name to match an allowlisted ID.

Executive summary

The OpenClaw Nextcloud Talk plugin contains a critical logic flaw that allows attackers to bypass conversation allowlists and gain unauthorized access to restricted chats.

Vulnerability

The plugin performs allowlist validation by checking the mutable actor.name field (display name) instead of a unique, immutable user ID. An attacker can change their display name to match a known authorized user, tricking the system into granting access to restricted Direct Messages (DM) and chat rooms.

Business impact

This flaw allows for unauthorized access to sensitive internal communications. Confidential business discussions, credentials shared in chat, and private user data could be exposed to unauthorized parties. The CVSS score of 9.8 underscores the total failure of the authorization mechanism within the plugin.

Remediation

Immediate Action: Update the OpenClaw Nextcloud Talk plugin to version 2026.2.6 or later, which implements validation based on immutable user identifiers.

Proactive Monitoring: Review Nextcloud audit logs for frequent display name changes followed by access to restricted chat rooms.

Compensating Controls: Disable the ability for users to change their own display names within Nextcloud until the patch is applied, or implement secondary authentication for sensitive rooms.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Relying on user-controlled fields for security validation is a critical design error. Administrators must apply the update immediately to ensure that chat room access is governed by secure, immutable IDs. Prioritize this update to protect the confidentiality of organizational communications.