


Perceptive Security
SOC/SIEM Consultancy

OpenClaw before 2026.3.13 reads and buffers Telegram webhook request bodies before validating the x-telegram-bot-api-secret-token header, allowing unauthenticat…
Published:
28 maart 2026 om 23:00:00
Alert date:
29 maart 2026 om 14:05:44
Source:
nvd.nist.gov
Web Technologies, Email & Messaging
OpenClaw versions before 2026.3.13 contain a resource exhaustion vulnerability in their Telegram webhook implementation. The application reads and buffers webhook request bodies before validating the x-telegram-bot-api-secret-token header, allowing unauthenticated attackers to exhaust server resources. Attackers can exploit this by sending POST requests to the webhook endpoint, forcing memory consumption, socket time usage, and JSON parsing work before authentication occurs. This design flaw enables denial-of-service attacks against OpenClaw installations using Telegram webhooks.
Technical details
Mitigation steps:
Affected products:
OpenClaw
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-32980
https://github.com/openclaw/openclaw/commit/7e49e98f79073b11134beac27fdff547ba5a4a02
https://github.com/openclaw/openclaw/security/advisories/GHSA-jq3f-vjww-8rq7
https://www.vulncheck.com/advisories/openclaw-resource-exhaustion-via-unauthenticated-telegram-webhook-request
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
