Home

Description

OpenClaw before 2026.3.31 contains an authentication rate limiting bypass vulnerability that allows attackers to circumvent shared authentication protections using fake device tokens. Attackers can exploit the mixed WebSocket authentication flow to bypass rate limiting controls and conduct brute force attacks against weak shared passwords.

PUBLISHED Reserved 2026-04-20 | Published 2026-04-23 | Updated 2026-04-24 | Assigner VulnCheck




MEDIUM: 6.3CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

LOW: 3.7CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

Improper Control of Interaction Frequency

Product status

Default status
unaffected

Any version before 2026.3.31
affected

2026.3.31 (semver)
unaffected

Credits

KEXNA (@kexinoh) reporter

References

github.com/...enclaw/security/advisories/GHSA-6p8r-6m93-557f (GitHub Security Advisory (GHSA-6p8r-6m93-557f)) vendor-advisory

github.com/...ommit/af0c0862f22ca4492406a3103d05e3628f94cbe9 (Patch Commit) patch

www.vulncheck.com/...te-limiting-bypass-via-fake-devicetoken (VulnCheck Advisory: OpenClaw < 2026.3.31 - Authentication Rate Limiting Bypass via Fake DeviceToken) third-party-advisory

cve.org (CVE-2026-41333)

nvd.nist.gov (CVE-2026-41333)

Download JSON