CVE-2026-32974
Authentication Bypass in OpenClaw Feishu Webhook Allows Event Forgery
Publication date: 2026-03-29
Last updated on: 2026-03-30
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | to 2026.3.12 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-347 | The product does not verify, or incorrectly verifies, the cryptographic signature for data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-32974 is an authentication bypass vulnerability in OpenClaw's Feishu webhook mode versions before 2026.3.12. When only the verificationToken is configured without the encryptKey, the system fails to properly verify cryptographic signatures, allowing unauthenticated network attackers to inject forged Feishu events.
This happens because the absence of encryptKey removes the cryptographic verification boundary, enabling attackers to impersonate legitimate senders and send malicious events to the webhook endpoint.
Exploiting this vulnerability can trigger downstream tool executions based on the local agent policy, posing a significant integrity risk.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthenticated attackers to inject forged events and trigger unauthorized downstream tool execution, representing a significant integrity risk and potential unauthorized data modification.
Such unauthorized data modification and potential compromise of data integrity could negatively impact compliance with standards and regulations like GDPR and HIPAA, which require protection of data integrity and prevention of unauthorized access or processing.
However, the provided information does not explicitly discuss compliance implications or specific impacts on regulatory requirements.
How can this vulnerability impact me? :
This vulnerability allows unauthenticated attackers to inject forged Feishu events into the OpenClaw webhook endpoint.
As a result, attackers can trigger unauthorized downstream tool executions, potentially leading to unauthorized data modification.
The impact includes a high integrity risk, with lower but present impacts on confidentiality and availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection of this vulnerability involves identifying OpenClaw deployments running versions prior to 2026.3.12 that use Feishu webhook mode configured with only a verificationToken and no encryptKey.
You can check the OpenClaw version by running a command like `openclaw --version` or inspecting the package version in your deployment environment.
To detect if the vulnerable configuration is present, review the webhook configuration files or environment variables to verify if only verificationToken is set without encryptKey.
Network detection can include monitoring incoming requests to the Feishu webhook endpoint for suspicious or forged events, especially those lacking proper cryptographic signatures.
Specific commands depend on your environment, but examples include:
- Check OpenClaw version: `openclaw --version`
- Search configuration files for verificationToken and encryptKey settings, e.g., `grep -r 'verificationToken' /path/to/config` and `grep -r 'encryptKey' /path/to/config`
- Monitor network traffic to the webhook endpoint using tools like `tcpdump` or `Wireshark` to identify suspicious POST requests.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation step is to upgrade OpenClaw to version 2026.3.12 or later, where the vulnerability is fixed.
Ensure that the Feishu webhook mode is configured with both verificationToken and encryptKey, as the presence of encryptKey enforces proper cryptographic verification and fail-closed behavior.
If immediate upgrade is not possible, restrict network access to the webhook endpoint to trusted sources only to reduce the risk of exploitation.
Review and monitor webhook logs for any suspicious or forged event attempts.