Impact
The vulnerability exists because OpenClaw processes JSON payloads before verifying the webhook signature, allowing attackers to send large or malformed JSON data that causes high CPU and memory usage. This leads to a denial of service by exhausting server resources. The weakness is identified as CWE-696: Unchecked Input for Resource Exhaustion.
Affected Systems
The affected product is OpenClaw, all releases prior to version 2026.3.25. The vendor is OpenClaw. Anyone running an older version is susceptible.
Risk and Exploitability
The CVSS score is 6.9, indicating medium severity, and the vulnerability is not listed in KEV. Exploitation requires only unauthenticated HTTP access to the webhook endpoint, which is typically exposed on the public network. Attackers can craft requests that trigger excessive parsing and consume CPU and memory, leading to service degradation or crash. The lack of authentication and the ability to send arbitrary JSON payloads make this a likely vector on exposed installations.
OpenCVE Enrichment
Github GHSA