top of page
perceptive_background_267k.jpg

OpenClaw versions prior to 2026.2.12 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measur…

Published:

4 maart 2026 om 23:00:00

Alert date:

5 maart 2026 om 23:13:13

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Identity & Access

OpenClaw versions prior to 2026.2.12 contain a timing side-channel vulnerability in hook token validation. The application uses non-constant-time string comparison for authentication token validation, allowing remote attackers with network access to the hooks endpoint to infer authentication tokens through timing measurements. Attackers can exploit this timing side-channel across multiple requests to gradually determine the complete authentication token. This vulnerability affects the authentication mechanism and could lead to unauthorized access to the hooks endpoint. The issue has been addressed in version 2026.2.12 and later.

Technical details

Mitigation steps:

Affected products:

OpenClaw

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page