Description
OpenClaw's Nextcloud Talk plugin versions prior to 2026.2.6 accept equality matching on the mutable actor.name display name field for allowlist validation, allowing attackers to bypass DM and room allowlists. An attacker can change their Nextcloud display name to match an allowlisted user ID and gain unauthorized access to restricted conversations.
Published: 2026-03-05
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access to Restricted Conversations
Action: Apply Patch
AI Analysis

Impact

OpenClaw's Nextcloud Talk plugin versions before 2026.2.6 incorrectly use a mutable display name field for allowlist checks, enabling an attacker to set their Nextcloud display name to any allowlisted user ID. This allows the attacker to bypass domain management and room allowlists and join conversations they should not have access to. The flaw represents a significant escalation of privilege within the application, compromising confidentiality of restricted conversations.

Affected Systems

The vulnerability affects the OpenClaw Nextcloud Talk plugin, specifically any deployment running a version earlier than 2026.2.6.

Risk and Exploitability

The CVSS score of 9.3 places the flaw in the high severity range. However, the EPSS score is reported as less than 1%, indicating a very low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote, exploiting the plugin’s allowlist logic via a user’s display name; exploit requires legitimate authentication to the Nextcloud instance, after which the attacker can spoof a display name and gain access to protected rooms.

Generated by OpenCVE AI on April 16, 2026 at 11:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the OpenClaw Nextcloud Talk plugin to version 2026.2.6 or later, which fixes the allowlist validation logic.
  • If an upgrade is not immediately possible, disable or restrict the ability for users to change their display name so that the actor.name field remains immutable.
  • Configure the allowlist to validate against immutable user identifiers rather than mutable display names, ensuring that spoofing the display name cannot grant additional access.

Generated by OpenCVE AI on April 16, 2026 at 11:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-r5h9-vjqc-hq3r Nextcloud Talk allowlist bypass via actor.name display name spoofing
History

Mon, 09 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Openclaw
Openclaw nextcloud-talk
Vendors & Products Openclaw
Openclaw nextcloud-talk

Thu, 05 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw's Nextcloud Talk plugin versions prior to 2026.2.6 accept equality matching on the mutable actor.name display name field for allowlist validation, allowing attackers to bypass DM and room allowlists. An attacker can change their Nextcloud display name to match an allowlisted user ID and gain unauthorized access to restricted conversations.
Title OpenClaw Nextcloud Talk < 2026.2.6 - Allowlist Bypass via actor.name Display Name Spoofing
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Nextcloud-talk
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-09T18:08:50.134Z

Reserved: 2026-02-27T19:19:46.447Z

Link: CVE-2026-28474

cve-icon Vulnrichment

Updated: 2026-03-09T18:08:45.625Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T22:16:21.423

Modified: 2026-03-09T13:36:08.413

Link: CVE-2026-28474

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:00:11Z

Weaknesses