Description
OpenClaw before 2026.3.31 lacks a shared pre-auth concurrency budget on the public LINE webhook path, allowing attackers to cause transient availability loss. Remote attackers can flood the webhook endpoint with concurrent requests before signature verification to exhaust resources and degrade service availability.
Problem types
Improper Control of Interaction Frequency
Product status
Any version before 2026.3.31
2026.3.31 (semver)
Credits
Nathan (@nexrin)
KeenSecurityLab
References
github.com/...enclaw/security/advisories/GHSA-qcc3-jqwp-5vh2 (GitHub Security Advisory (GHSA-qcc3-jqwp-5vh2))
github.com/...ommit/57c47d8c7fbf5a2e70cc4dec2380977968903cad (Patch Commit)
www.vulncheck.com/...ne-webhook-handler-pre-auth-concurrency (VulnCheck Advisory: OpenClaw < 2026.3.31 - Denial of Service via LINE Webhook Handler Pre-Auth Concurrency)