Exploit for CVE-2026-28454

OpenClaw versions prior to 2026.2.2 fail to validate webhook secrets in Telegram webhook mode (must be enabled), allowing unauthenticated HTTP POST requests to the webhook endpoint that trust attacker-controlled JSON payloads. Remote attackers can forge Telegram updates by spoofing message.from.id and chat.id fields to bypass sender allowlists and execute privileged bot commands.

Published: 2026-03-05

CVSS: 9.8

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Download Exploit for CVE-2026-28454 here:

Use Tor Browser to access .onion site.

https://sonitex.com/exploit-45-cve-2026-26093/

https://sonitex.com/exploit-301-cve-2026-27772/

https://sonitex.com/exploit-405-cve-2026-26700/