Unauthenticated Cryptographic Vulnerability in OpenClaw by OpenClaw Vendor
CVE-2026-35627

6.9MEDIUM

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
9 April 2026

What is CVE-2026-35627?

OpenClaw versions prior to 2026.3.22 improperly execute cryptographic and dispatch operations on inbound Nostr direct messages without first validating sender and pairing policies. This oversight allows attackers to exploit the system by sending specifically crafted direct messages, which can lead to unauthorized pre-authentication computations. As a result, this vulnerability can enable denial of service through resource exhaustion, affecting the stability and performance of the application.

Affected Version(s)

OpenClaw 0 < 2026.3.22

OpenClaw 2026.3.22

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Karan Kurani (@kuranikaran)
.