OpenClaw 2026.2.26 before 2026.3.31 enforces pending pairing-request caps per channel file instead of per account, allowing attackers to exhaust the shared pending window. Remote attackers can submit pairing requests from other accounts to block new pairing challenges on unaffected accounts, causing denial of service.
References
Configurations
History
29 Apr 2026, 14:44
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Openclaw openclaw
Openclaw |
|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/openclaw/openclaw/commit/9bc1f896c8cd325dd4761681e9bdb8c425f69785 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-wwfp-w96m-c6x8 - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-denial-of-service-via-improper-pending-pairing-request-cap-enforcement - Third Party Advisory |
23 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-23 22:16
Updated : 2026-04-29 14:44
NVD link : CVE-2026-41346
Mitre link : CVE-2026-41346
CVE.ORG link : CVE-2026-41346
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-799
Improper Control of Interaction Frequency
