Description
OpenClaw before 2026.3.24 contains an incomplete fix for CVE-2026-32011 where the Feishu webhook handler accepts request bodies with permissive limits of 1MB and 30-second timeout before signature verification. An unauthenticated attacker can exhaust server connection resources by sending concurrent slow HTTP POST requests to the Feishu webhook endpoint, blocking legitimate webhook deliveries.
Problem types
CWE-405 Asymmetric Resource Consumption (Amplification)
Product status
Any version before 2026.3.24
2026.3.24 (semver)
References
github.com/...enclaw/security/advisories/GHSA-w6m8-cqvj-pg5v (GitHub Security Advisory (GHSA-w6m8-cqvj-pg5v))
www.vulncheck.com/...ia-feishu-webhook-pre-auth-body-parsing (VulnCheck Advisory: OpenClaw < 2026.3.24 - Denial of Service via Feishu Webhook Pre-Auth Body Parsing)