CVE-2026-34505 in OpenClaw
Сводка (Английский)
OpenClaw before 2026.3.12 applies rate limiting only after successful webhook authentication, allowing attackers to bypass rate limits and brute-force webhook secrets. Attackers can submit repeated authentication requests with invalid secrets without triggering rate limit responses, enabling systematic secret guessing and subsequent forged webhook submission.
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Ответственный
VulnCheck
Резервировать
30.03.2026
Раскрытие
31.03.2026
Статус
Подтверждённый
Записи
VulDB provides additional information and datapoints for this CVE:
| ИД | Уязвимость | CWE | Экс | Кон | CVE |
|---|---|---|---|---|---|
| 354367 | OpenClaw раскрытие информации | 307 | Не определено | Официальное исправление | CVE-2026-34505 |