Untriaged
Permalink
CVE-2026-32980
7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
OpenClaw < 2026.3.13 - Resource Exhaustion via Unauthenticated Telegram Webhook Request
OpenClaw before 2026.3.13 reads and buffers Telegram webhook request bodies before validating the x-telegram-bot-api-secret-token header, allowing unauthenticated attackers to exhaust server resources. Attackers can send POST requests to the webhook endpoint to force memory consumption, socket time, and JSON parsing work before authentication validation occurs.
References
-
GitHub Security Advisory (GHSA-jq3f-vjww-8rq7) third-party-advisory
-
Patch Commit patch
Affected products
OpenClaw
- <2026.3.13
- ==2026.3.13
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>