
Cloud Vulnerability DB
A community-led vulnerabilities database
In affected versions of the optional Nextcloud Talk plugin (installed separately; not bundled with the core OpenClaw install), an untrusted webhook field (actor.name, display name) could be treated as an allowlist identifier. An attacker could change their Nextcloud display name to match an allowlisted user ID and bypass DM or room allowlists.
Nextcloud Talk webhook payloads provide a stable sender identifier (actor.id) and a mutable display name (actor.name). In affected versions, the plugin’s allowlist matching accepted equality on the display name, which is attacker-controlled.
@openclaw/nextcloud-talk (npm)<= 2026.2.2>= 2026.2.6Note: This advisory applies to the optional Nextcloud Talk plugin package. Core openclaw is not impacted unless you installed and use @openclaw/nextcloud-talk.@openclaw/nextcloud-talk: 2026.2.6 (published 2026-02-07 UTC)Upgrade @openclaw/nextcloud-talk to >= 2026.2.6.
The patched version range is set to the first npm release that contains the fix. Once you are ready, you can publish this advisory without additional version edits. Thanks @MegaManSec (https://joshua.hu) of AISLE Research Team for reporting.
Source: NVD
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."