top of page
perceptive_background_267k.jpg

OpenClaw before 2026.3.12 contains an authentication bypass vulnerability in Feishu webhook mode when only verificationToken is configured without encryptKey, a…

Published:

28 maart 2026 om 23:00:00

Alert date:

29 maart 2026 om 14:05:43

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Security Tools

OpenClaw before version 2026.3.12 contains an authentication bypass vulnerability in Feishu webhook mode. The vulnerability occurs when only verificationToken is configured without encryptKey, allowing acceptance of forged events. Unauthenticated network attackers can exploit this by injecting forged Feishu events and triggering downstream tool execution by reaching the webhook endpoint. This represents a significant security risk as it allows unauthorized remote code execution through webhook manipulation.

Technical details

Mitigation steps:

Affected products:

OpenClaw

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page