NVD Vulnerability Detail
Search Exploit, PoC
CVE-2026-35628
Summary

OpenClaw before 2026.3.25 contains a missing rate limiting vulnerability in Telegram webhook authentication that allows attackers to brute-force weak webhook secrets. The vulnerability enables repeated authentication guesses without throttling, permitting attackers to systematically guess webhook secrets through brute-force attacks.

Publication Date April 10, 2026, 7:16 a.m.
Registration Date April 15, 2026, 11:35 a.m.
Last Update April 16, 2026, 5:38 a.m.
CVSS3.1 : MEDIUM
スコア 6.5
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR) 不要
利用者の関与(UI) 不要
影響の想定範囲(S) 変更なし
機密性への影響(C)
完全性への影響(I)
可用性への影響(A) なし
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* 2026.3.25
Related information, measures and tools
Common Vulnerabilities List