CVE-2026-35623
Missing Rate Limiting in OpenClaw Webhook Enables Brute-Force Access
Publication date: 2026-04-09
Last updated on: 2026-04-16
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | to 2026.3.25 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-307 | The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in OpenClaw versions before 2026.3.25 and involves a missing rate limiting mechanism in the webhook authentication process.
Because there is no throttling, attackers can repeatedly submit incorrect password guesses to the webhook endpoint, allowing them to brute-force weak webhook passwords.
Successful exploitation can lead to compromised authentication and unauthorized access.
How can this vulnerability impact me? :
The vulnerability allows remote attackers to gain unauthorized access by brute-forcing weak webhook passwords.
This unauthorized access can lead to potential compromise of the system or data accessible through the webhook.