Missing Rate Limiting Vulnerability in OpenClaw's Telegram Webhook Authentication
CVE-2026-35628
6.3MEDIUM
What is CVE-2026-35628?
OpenClaw prior to version 2026.3.25 is vulnerable to brute-force attacks due to the absence of rate limiting in its Telegram webhook authentication mechanism. This vulnerability allows attackers to repeatedly attempt to guess weak webhook secrets without any restrictions, significantly increasing the risk of unauthorized access. To mitigate this risk, users must update to the latest version that incorporates the necessary rate limiting protections.
Affected Version(s)
OpenClaw 0 < 2026.3.25
OpenClaw 2026.3.25
