CVE-2026-35646
Pre-Auth Rate-Limit Bypass in OpenClaw Webhook Token Validation
Publication date: 2026-04-09
Last updated on: 2026-04-15
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | to 2026.3.25 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-307 | The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in OpenClaw versions before 2026.3.25 and involves a pre-authentication rate-limit bypass in webhook token validation.
Because invalid webhook tokens are rejected without limiting the number of repeated authentication attempts, attackers can rapidly send many requests to guess weak webhook secrets through brute force.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can brute-force weak webhook secrets, potentially gaining unauthorized access to webhook functionality.
This could lead to unauthorized actions or information disclosure through the compromised webhook.