


Perceptive Security
SOC/SIEM Consultancy

OpenClaw versions prior to 2026.2.12 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measur…
Published:
4 maart 2026 om 23:00:00
Alert date:
5 maart 2026 om 23:13:13
Source:
nvd.nist.gov
Web Technologies, Identity & Access
OpenClaw versions prior to 2026.2.12 contain a timing side-channel vulnerability in hook token validation. The application uses non-constant-time string comparison for authentication token validation, allowing remote attackers with network access to the hooks endpoint to infer authentication tokens through timing measurements. Attackers can exploit this timing side-channel across multiple requests to gradually determine the complete authentication token. This vulnerability affects the authentication mechanism and could lead to unauthorized access to the hooks endpoint. The issue has been addressed in version 2026.2.12 and later.
Technical details
Mitigation steps:
Affected products:
OpenClaw
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-28464
https://github.com/openclaw/openclaw/commit/113ebfd6a23c4beb8a575d48f7482593254506ec
https://github.com/openclaw/openclaw/security/advisories/GHSA-jmm5-fvh5-gf4p
https://www.vulncheck.com/advisories/openclaw-timing-attack-in-hooks-token-authentication
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
