CVE-2026-34505

OpenClaw before 2026.3.12 applies rate limiting only after successful webhook authentication, allowing attackers to bypass rate limits and brute-force webhook secrets. Attackers can submit repeated authentication requests with invalid secrets without triggering rate limit responses, enabling systematic secret guessing and subsequent forged webhook submission.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

02 Apr 2026, 12:22

Type Values Removed Values Added
First Time Openclaw openclaw
Openclaw
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-5m9r-p9g7-679c - () https://github.com/openclaw/openclaw/security/advisories/GHSA-5m9r-p9g7-679c - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-webhook-rate-limiting-bypass-via-pre-authentication-secret-validation - () https://www.vulncheck.com/advisories/openclaw-webhook-rate-limiting-bypass-via-pre-authentication-secret-validation - Third Party Advisory
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

31 Mar 2026, 18:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 6.5

31 Mar 2026, 12:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-31 12:16

Updated : 2026-04-02 12:22


NVD link : CVE-2026-34505

Mitre link : CVE-2026-34505

CVE.ORG link : CVE-2026-34505


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts