CVE-2026-34505 in OpenClawИнформация

Сводка (Английский)

OpenClaw before 2026.3.12 applies rate limiting only after successful webhook authentication, allowing attackers to bypass rate limits and brute-force webhook secrets. Attackers can submit repeated authentication requests with invalid secrets without triggering rate limit responses, enabling systematic secret guessing and subsequent forged webhook submission.

Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

Ответственный

VulnCheck

Резервировать

30.03.2026

Раскрытие

31.03.2026

Статус

Подтверждённый

Записи

VulDB provides additional information and datapoints for this CVE:

Источники

Want to know what is going to be exploited?

We predict KEV entries!