Untriaged
Permalink
CVE-2026-28474
9.8 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Activity log
- Created suggestion
OpenClaw Nextcloud Talk < 2026.2.6 - Allowlist Bypass via actor.name Display Name Spoofing
OpenClaw's Nextcloud Talk plugin versions prior to 2026.2.6 accept equality matching on the mutable actor.name display name field for allowlist validation, allowing attackers to bypass DM and room allowlists. An attacker can change their Nextcloud display name to match an allowlisted user ID and gain unauthorized access to restricted conversations.
References
-
GitHub Security Advisory (GHSA-r5h9-vjqc-hq3r) vendor-advisory
-
Patch Commit #1 patch
Affected products
nextcloud-talk
- <2026.2.6
Package maintainers
-
@kashw2 Keanu Ashwell <supra4keanu@hotmail.com>