Description
OpenClaw 2026.2.26 before 2026.3.31 enforces pending pairing-request caps per channel file instead of per account, allowing attackers to exhaust the shared pending window. Remote attackers can submit pairing requests from other accounts to block new pairing challenges on unaffected accounts, causing denial of service.
Problem types
Improper Control of Interaction Frequency
Product status
2026.2.26 (semver) before 2026.3.31
2026.3.31 (semver)
Credits
smaeljaish771
KeenSecurityLab
References
github.com/...enclaw/security/advisories/GHSA-wwfp-w96m-c6x8 (GitHub Security Advisory (GHSA-wwfp-w96m-c6x8))
github.com/...ommit/9bc1f896c8cd325dd4761681e9bdb8c425f69785 (Patch Commit)
www.vulncheck.com/...pending-pairing-request-cap-enforcement (VulnCheck Advisory: OpenClaw 2026.2.26 < 2026.3.31 - Denial of Service via Improper Pending Pairing Request Cap Enforcement)