OpenClaw before 2026.3.28 contains a missing rate limiting vulnerability in the Nextcloud Talk webhook authentication that allows attackers to brute-force weak shared secrets. Attackers who can reach the webhook endpoint can exploit this to forge inbound webhook events by repeatedly attempting authentication without throttling.
References
Configurations
History
01 Apr 2026, 18:54
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openclaw/openclaw/commit/e403decb6e20091b5402780a7ccd2085f98aa3cd - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-9528-x887-j2fp - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-brute-force-attack-via-missing-rate-limiting-on-webhook-shared-secret-authentication - Third Party Advisory | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
31 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
31 Mar 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-31 15:16
Updated : 2026-04-01 18:54
NVD link : CVE-2026-33580
Mitre link : CVE-2026-33580
CVE.ORG link : CVE-2026-33580
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts
