The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-28454

CVE-2026-28454: OpenClaw Auth Bypass Vulnerability

CVE-2026-28454 is an authentication bypass flaw in OpenClaw that allows attackers to forge Telegram webhook requests and execute privileged bot commands. This article covers technical details, affected versions, and mitigations.

Published: March 6, 2026

CVE-2026-28454 Overview

OpenClaw versions prior to 2026.2.2 contain an authorization bypass vulnerability in the Telegram webhook mode functionality. The application fails to validate webhook secrets when Telegram webhook mode is enabled, allowing unauthenticated HTTP POST requests to the webhook endpoint that trust attacker-controlled JSON payloads. Remote attackers can forge Telegram updates by spoofing message.from.id and chat.id fields to bypass sender allowlists and execute privileged bot commands.

Critical Impact

Attackers can bypass authentication controls and execute privileged bot commands by forging Telegram webhook requests, potentially leading to unauthorized actions and data manipulation within systems utilizing the OpenClaw bot.

Affected Products

  • OpenClaw versions prior to 2026.2.2
  • Systems with Telegram webhook mode enabled
  • Deployments exposing the webhook endpoint to untrusted networks

Discovery Timeline

  • 2026-03-05 - CVE-2026-28454 published to NVD
  • 2026-03-05 - Last updated in NVD database

Technical Details for CVE-2026-28454

Vulnerability Analysis

This vulnerability is classified as Insufficient Verification of Data Authenticity (CWE-345), an authorization bypass flaw that affects OpenClaw's Telegram webhook integration. When Telegram webhook mode is enabled, the application exposes an HTTP endpoint designed to receive update notifications from Telegram's servers.

The core issue lies in the webhook endpoint's failure to validate the authenticity of incoming requests. Telegram provides a mechanism for webhook secret validation, where the bot token can be used to generate a cryptographic signature that Telegram includes in webhook requests. OpenClaw versions prior to 2026.2.2 do not implement this validation, meaning any HTTP POST request to the webhook endpoint is accepted and processed as if it came from Telegram.

This allows attackers to craft malicious JSON payloads that mimic legitimate Telegram update structures. By spoofing the message.from.id field (which identifies the sender) and the chat.id field (which identifies the conversation), attackers can impersonate authorized users who are on the bot's allowlist. Once the forged message passes the allowlist check, the attacker can execute any privileged bot command that the impersonated user would have access to.

Root Cause

The root cause is the absence of webhook secret validation in the Telegram webhook handler. Telegram recommends that bot developers verify incoming webhook requests using a secret token mechanism to ensure requests originate from Telegram's servers. OpenClaw's implementation accepts all incoming requests without cryptographic verification, trusting the content of the JSON payload without authenticating the source.

Attack Vector

The attack requires network access to the webhook endpoint, which must be exposed for Telegram webhook mode to function. An attacker can exploit this vulnerability by:

  1. Discovering the webhook endpoint URL (often predictable or discoverable through reconnaissance)
  2. Crafting an HTTP POST request with a JSON payload that mimics Telegram's update format
  3. Setting the message.from.id field to match an authorized user ID from the allowlist
  4. Setting the chat.id field to a valid chat identifier
  5. Including a command payload in the message text to trigger privileged bot functionality

The vulnerability is exploited over the network and does not require prior authentication or user interaction. The attacker must know or guess a valid authorized user ID, but this information may be obtainable through other means.

The attack mechanism involves sending forged HTTP POST requests to the unprotected webhook endpoint. Since there is no secret validation, the server processes these requests as legitimate Telegram updates. For technical implementation details, refer to the GitHub Security Advisory.

Detection Methods for CVE-2026-28454

Indicators of Compromise

  • Unusual HTTP POST requests to the Telegram webhook endpoint from IP addresses outside Telegram's infrastructure ranges
  • High volume of webhook requests within short time periods from single sources
  • Webhook requests containing message.from.id values that don't correlate with expected user activity patterns
  • Bot command executions that don't match authenticated user behavior or timing

Detection Strategies

  • Implement network monitoring to detect POST requests to the webhook endpoint originating from non-Telegram IP ranges
  • Deploy web application firewall (WAF) rules to flag requests to the webhook path that lack proper Telegram headers
  • Enable verbose logging on the OpenClaw application to capture all incoming webhook requests for forensic analysis
  • Monitor bot command execution logs for commands executed by allowlisted users during unusual hours or from unexpected patterns

Monitoring Recommendations

  • Configure alerting on the webhook endpoint for requests from IP addresses outside Telegram's published IP ranges (149.154.160.0/20 and 91.108.4.0/22)
  • Implement rate limiting detection to identify potential brute-force attempts to guess authorized user IDs
  • Cross-reference bot command executions with known user activity to detect anomalous privileged command usage

How to Mitigate CVE-2026-28454

Immediate Actions Required

  • Upgrade OpenClaw to version 2026.2.2 or later immediately
  • If immediate upgrade is not possible, disable Telegram webhook mode and switch to polling mode as a temporary measure
  • Review bot command logs for suspicious activity that may indicate prior exploitation
  • Audit current allowlist configurations and remove unnecessary privileged users

Patch Information

Security patches have been released addressing this vulnerability. Multiple commits have been made to remediate the issue:

  • GitHub Commit Fix
  • GitHub Commit Update
  • GitHub Commit Change
  • GitHub Commit Modification

For complete details, see the GitHub Security Advisory (GHSA-fhvm-j76f-qmjv) and VulnCheck Authorization Bypass Advisory.

Workarounds

  • Switch from webhook mode to polling mode, which does not expose an HTTP endpoint and pulls updates directly from Telegram's API
  • Implement network-level access controls to restrict webhook endpoint access to Telegram's official IP ranges only
  • Deploy a reverse proxy in front of the webhook endpoint that validates the source IP against Telegram's infrastructure
  • If using a web application firewall, configure rules to block requests to the webhook path from non-Telegram sources
bash
# Configuration example - restrict webhook access to Telegram IP ranges using iptables
# Telegram IP ranges: 149.154.160.0/20 and 91.108.4.0/22
iptables -A INPUT -p tcp --dport 443 -s 149.154.160.0/20 -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s 91.108.4.0/22 -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -m string --string "/webhook" --algo bm -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechOpenclaw

  • SeverityHIGH

  • CVSS Score8.2

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-345
  • Technical References
  • GitHub Commit Update

  • GitHub Commit Fix

  • GitHub Commit Change

  • GitHub Commit Modification

  • GitHub Security Advisory

  • VulnCheck Authorization Bypass Advisory
  • Related CVEs
  • CVE-2026-34511: OpenClaw OAuth Auth Bypass Vulnerability

  • CVE-2026-34426: OpenClaw Auth Bypass Vulnerability

  • CVE-2026-32916: Openclaw Auth Bypass Vulnerability

  • CVE-2026-32921: Openclaw Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English