CVE-2026-35646 PUBLISHED

OpenClaw < 2026.3.25 - Pre-Authentication Rate-Limit Bypass in Webhook Token Validation

Assigner: VulnCheck
Reserved: 04.04.2026 Published: 09.04.2026 Updated: 10.04.2026

OpenClaw before 2026.3.25 contains a pre-authentication rate-limit bypass vulnerability in webhook token validation that allows attackers to brute-force weak webhook secrets. The vulnerability exists because invalid webhook tokens are rejected without throttling repeated authentication attempts, enabling attackers to guess weak tokens through rapid successive requests.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS Score: 6.3

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 0 to 2026.3.25 (excl.)
  • Version 2026.3.25 is unaffected

Credits

  • Peng Zhou (@zpbrent) reporter

References

Problem Types

  • CWE-307 Improper Restriction of Excessive Authentication Attempts CWE