Impact
The vulnerability originates from OpenClaw processing Microsoft Teams webhook request bodies before performing JWT validation. An unauthenticated user can send specially crafted payloads that consume excessive CPU or memory, potentially causing a denial of service for legitimate users.
Affected Systems
OpenClaw OpenClaw, any version older than 2026.3.31.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity. Because the flaw is exploitable remotely and does not require authentication, the risk of exploitation is significant. No EPSS data is available and the issue is not listed in the CISA KEV catalog, but the attack vector is straightforward: attackers can send malicious Teams webhook payloads to any exposed OpenClaw instance.
OpenCVE Enrichment