CVE-2026-32011 PUBLISHED

OpenClaw < 2026.3.2 - Slow-Request Denial of Service via Pre-Auth Webhook Body Parsing

Assigner: VulnCheck
Reserved: 10.03.2026 Published: 19.03.2026 Updated: 20.03.2026

OpenClaw versions prior to 2026.3.2 contain a denial of service vulnerability in webhook handlers for BlueBubbles and Google Chat that parse request bodies before performing authentication and signature validation. Unauthenticated attackers can exploit this by sending slow or oversized request bodies to exhaust parser resources and degrade service availability.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 0 to 2026.3.2 (excl.)
  • Version 2026.3.2 is unaffected

Credits

  • Baozongwi'xd (@GCXWLP) reporter

References

Problem Types

  • CWE-770: Allocation of Resources Without Limits or Throttling CWE