CVE-2026-34505
OpenClaw before 2026.3.12 applies rate limiting only after successful webhook authentication, allowing attackers to bypass rate limits and brute-force webhook secrets. Attackers can submit repeated authentication requests with invalid secrets without triggering rate limit responses, enabling systematic secret guessing and subsequent forged webhook submission.
Vendor
Product
CWE
Yayın Tarihi
2026-03-31 12:16:30
Güncelleme
2026-04-02 12:22:44
Source Identifier
disclosure@vulncheck.com
KEV Date Added
-