OpenClaw before 2026.3.13 reads and buffers Telegram webhook request bodies before validating the x-telegram-bot-api-secret-token header, allowing unauthenticated attackers to exhaust server resources. Attackers can send POST requests to the webhook endpoint to force memory consumption, socket time, and JSON parsing work before authentication validation occurs.
References
Configurations
History
31 Mar 2026, 17:54
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Openclaw openclaw
Openclaw |
|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/openclaw/openclaw/commit/7e49e98f79073b11134beac27fdff547ba5a4a02 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-jq3f-vjww-8rq7 - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-resource-exhaustion-via-unauthenticated-telegram-webhook-request - Third Party Advisory |
29 Mar 2026, 13:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-29 13:17
Updated : 2026-03-31 17:54
NVD link : CVE-2026-32980
Mitre link : CVE-2026-32980
CVE.ORG link : CVE-2026-32980
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-770
Allocation of Resources Without Limits or Throttling
