Impact
OpenClaw versions before 2026.2.12 with the Nostr plugin enabled expose two HTTP endpoints that allow unauthenticated users to read and modify Nostr profiles. An attacker can change profile data, persist those changes in gateway configuration, and use the gateway’s private key to sign and publish Nostr events, potentially enabling fraudulent activity or data leakage.
Affected Systems
All installations of OpenClaw running a version earlier than 2026.2.12 where the optional Nostr plugin is active are affected. The vulnerability exists regardless of whether the gateway is exposed only locally or to a wider network.
Risk and Exploitability
The vulnerability has a CVSS score of 8.3, indicating high severity, but its EPSS score is below 1 % and it is not listed in the CISA KEV catalog, suggesting limited current exploitation. The endpoints are reachable over HTTP, so remote attackers who can access the gateway’s port beyond localhost can exploit the flaw. Successful exploitation allows an attacker to read sensitive profile data, modify profiles, and publish signed events using the bot’s private key.
OpenCVE Enrichment
Github GHSA