OpenClaw before 2026.3.25 parses JSON request bodies before validating webhook signatures, allowing unauthenticated attackers to force resource-intensive parsing operations. Remote attackers can send malicious webhook requests to trigger denial of service by exhausting server resources through forced JSON parsing before signature rejection.
References
Configurations
History
15 Apr 2026, 19:52
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
|
| References | () https://github.com/openclaw/openclaw/commit/5e8cb22176e9235e224be0bc530699261eb60e53 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-3h52-cx59-c456 - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-denial-of-service-via-unauthenticated-webhook-request-parsing - Third Party Advisory |
09 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-09 22:16
Updated : 2026-04-15 19:52
NVD link : CVE-2026-35640
Mitre link : CVE-2026-35640
CVE.ORG link : CVE-2026-35640
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-696
Incorrect Behavior Order
