Pre-Authentication Rate-Limit Bypass in OpenClaw Webhook Token Validation
CVE-2026-35646

6.3MEDIUM

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
9 April 2026

What is CVE-2026-35646?

OpenClaw versions before 2026.3.25 exhibit a vulnerability in their webhook token validation process, where the lack of throttling for failed authentication attempts allows attackers to perform brute-force attacks on weak webhook secrets. This flaw enables unauthorized users to make repeated requests, effectively bypassing intended security mechanisms and increasing the risk of exploitation. Organizations using earlier versions of OpenClaw must apply the necessary updates to mitigate the threat posed by this vulnerability.

Affected Version(s)

OpenClaw 0 < 2026.3.25

OpenClaw 2026.3.25

References

CVSS V4

Score:
6.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Peng Zhou (@zpbrent)
.