Description
OpenClaw before 2026.3.31 parses MS Teams webhook request bodies before performing JWT validation, allowing unauthenticated attackers to trigger resource exhaustion. Remote attackers can send malicious Teams webhook payloads to exhaust server resources by bypassing authentication checks.
Problem types
CWE-408: Incorrect Behavior Order: Early Amplification
Product status
Any version before 2026.3.31
2026.3.31 (semver)
Credits
AntAISecurityLab
References
github.com/...enclaw/security/advisories/GHSA-p464-m8x6-vhv8 (GitHub Security Advisory (GHSA-p464-m8x6-vhv8))
github.com/...ommit/3834d47099dd13c8244ed6de8b9ea9855c553623 (Patch Commit)
www.vulncheck.com/...enticated-ms-teams-webhook-body-parsing (VulnCheck Advisory: OpenClaw < 2026.3.31 - Resource Exhaustion via Unauthenticated MS Teams Webhook Body Parsing)