Home

Description

OpenClaw before 2026.3.31 parses MS Teams webhook request bodies before performing JWT validation, allowing unauthenticated attackers to trigger resource exhaustion. Remote attackers can send malicious Teams webhook payloads to exhaust server resources by bypassing authentication checks.

PUBLISHED Reserved 2026-04-20 | Published 2026-04-28 | Updated 2026-04-29 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-408: Incorrect Behavior Order: Early Amplification

Product status

Default status
unaffected

Any version before 2026.3.31
affected

2026.3.31 (semver)
unaffected

Credits

AntAISecurityLab reporter

References

github.com/...enclaw/security/advisories/GHSA-p464-m8x6-vhv8 (GitHub Security Advisory (GHSA-p464-m8x6-vhv8)) vendor-advisory

github.com/...ommit/3834d47099dd13c8244ed6de8b9ea9855c553623 (Patch Commit) patch

www.vulncheck.com/...enticated-ms-teams-webhook-body-parsing (VulnCheck Advisory: OpenClaw < 2026.3.31 - Resource Exhaustion via Unauthenticated MS Teams Webhook Body Parsing) third-party-advisory

cve.org (CVE-2026-41405)

nvd.nist.gov (CVE-2026-41405)

Download JSON