Impact
OpenClaw before 2026.3.12 applies rate limiting only after successful webhook authentication, which allows attackers to bypass the limits by repeatedly sending authentication requests with invalid secrets. This enables systematic brute‑force guessing of the webhook secret, after which the attacker can forge webhook requests to gain unauthorized access or perform privileged actions.
Affected Systems
The affected product is OpenClaw by OpenClaw, with all versions older than 2026.3.12. The vulnerability exists in the Node.js implementation of the webhook handling component.
Risk and Exploitability
The CVSS score of 6.9 indicates a medium‑to‑high severity. EPSS data is unavailable, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is remote, through the public webhook endpoint; an attacker can send HTTP requests to trigger authentication without rate limiting, brute‑force the secret, and subsequently submit forged webhooks.
OpenCVE Enrichment