User Impersonation Affecting @openclaw/matrix package, versions <2026.2.2


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (13th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-OPENCLAWMATRIX-15307826
  • published18 Feb 2026
  • disclosed17 Feb 2026
  • creditJoshua Rogers

Introduced: 17 Feb 2026

CVE-2026-28471  (opens in a new tab)
CWE-290  (opens in a new tab)

How to fix?

Upgrade @openclaw/matrix to version 2026.2.2 or higher.

Overview

@openclaw/matrix is an OpenClaw Matrix channel plugin

Affected versions of this package are vulnerable to User Impersonation via channels.matrix.dm.allowFrom. An attacker can impersonate an allowed identity and gain unauthorized access to the routing or agent pipeline by manipulating display names or MXID localparts to match allowlist entries.

Workaround

This vulnerability can be mitigated by ensuring allowlists contain only full Matrix user IDs (MXIDs) like @user:server or *, and not display names or bare localparts.

References

CVSS Base Scores

version 4.0
version 3.1