Impact
The vulnerable function, handleBlueBubblesWebhookRequest, mismanages authentication and allows an attacker to bypass required credentials. An attacker can trigger the function remotely, gaining unauthorized access to system resources via the bluebubbles Webhook component. The weakness aligns with CWE‑287, which signifies improper authentication controls.
Affected Systems
The vulnerability affects OpenClaw versions up to and including 2026.1.24, specifically the bluebubbles Webhook implementation located in extensions/bluebubbles/src/monitor.ts. Updating to OpenClaw 2026.2.12, which contains the patch a6653be0265f1f02b9de46c06f52ea7c81a836e6, resolves the issue.
Risk and Exploitability
The CVSS score of 6.9 indicates a moderate impact level. EPSS data is not available, and the flaw is not listed in the CISA KEV catalog. The public exploit can be triggered remotely through the webhook endpoint, and no additional network segmentation or firewall rules are currently required to mitigate exploitation until a patch is applied.
OpenCVE Enrichment