OpenClaw: Telegram Webhook Missing Guess Rate Limiting Enables Brute-Force Guessing of Weak Webhook Secret
Moderate severity
GitHub Reviewed
Published
Mar 26, 2026
in
openclaw/openclaw
•
Updated Mar 27, 2026
Description
Published to the GitHub Advisory Database
Mar 27, 2026
Reviewed
Mar 27, 2026
Last updated
Mar 27, 2026
Summary
Telegram Webhook Missing Guess Rate Limiting Enables Brute-Force Guessing of Weak Webhook Secret
Affected Packages / Versions
openclaw<= 2026.3.242026.3.252026.3.24Details
Telegram webhook auth previously rejected bad secrets but did not throttle repeated guesses, allowing brute-force attempts against weak webhook secrets. Commit
c2c136ae9517ddd0789d742a0fdf4c10e8c729a7adds repeated-guess throttling before auth failure responses.Verified vulnerable on tag
v2026.3.24and fixed onmainby commitc2c136ae9517ddd0789d742a0fdf4c10e8c729a7.Fix Commit(s)
c2c136ae9517ddd0789d742a0fdf4c10e8c729a7Release Process Note
2026.3.25is the next planned OpenClaw release version inpackage.json. This advisory is being published ahead of that npm release so the draft is no longer blocked; once2026.3.25is published, the structured patched-version metadata will match the released artifact.References