Description
OpenClaw before 2026.4.4 contains a race condition vulnerability in shared-secret authentication that allows concurrent asynchronous requests to bypass the per-key rate-limit budget. Attackers can exploit this by sending multiple simultaneous authentication attempts to circumvent intended rate-limiting protections on Tailscale-capable paths.
Problem types
CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Product status
Any version before 2026.4.4
2026.4.4 (semver)
Credits
Akiyama Mio (@Telecaster2147)
References
github.com/...enclaw/security/advisories/GHSA-25wv-8phj-8p7r (GitHub Security Advisory (GHSA-25wv-8phj-8p7r))
github.com/...ommit/d7c3210cd6f5fdfdc1beff4c9541673e814354d5 (Patch Commit)
www.vulncheck.com/...oncurrent-async-authentication-attempts (VulnCheck Advisory: OpenClaw < 2026.4.4 - Rate-Limit Bypass via Concurrent Async Authentication Attempts)