top of page
perceptive_background_267k.jpg

OpenClaw before 2026.3.13 reads and buffers Telegram webhook request bodies before validating the x-telegram-bot-api-secret-token header, allowing unauthenticat…

Published:

28 March 2026 at 23:00:00

Alert date:

29 March 2026 at 14:05:44

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Email & Messaging

OpenClaw versions before 2026.3.13 contain a resource exhaustion vulnerability in their Telegram webhook implementation. The application reads and buffers webhook request bodies before validating the x-telegram-bot-api-secret-token header, allowing unauthenticated attackers to exhaust server resources. Attackers can exploit this by sending POST requests to the webhook endpoint, forcing memory consumption, socket time usage, and JSON parsing work before authentication occurs. This design flaw enables denial-of-service attacks against OpenClaw installations using Telegram webhooks.

Technical details

Mitigation steps:

Affected products:

OpenClaw

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page