CVE-2026-35670
MEDIUM SEVERITYCVSS Score & Metrics
Base Score
5.9 / 10
Vector String
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
Vulnerability Description
OpenClaw before 2026.3.22 contains a webhook reply delivery vulnerability that allows attackers to rebind chat replies to unintended users by exploiting mutable username matching instead of stable numeric user identifiers. Attackers can manipulate username changes to redirect webhook-triggered replies to different users, bypassing the intended recipient binding recorded in webhook events.
Vulnerability Details
Published Date
Last Modified
CWE ID
CWE-807
Source
NVD
Vendor
OpenClaw
Product
OpenClaw
External References
- https://github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dac87
- https://github.com/openclaw/openclaw/commit/7ade3553b74ee3f461c4acd216653d5ba411f455
- https://github.com/openclaw/openclaw/security/advisories/GHSA-wv46-v6xc-2qhf
- https://www.vulncheck.com/advisories/openclaw-webhook-reply-rebinding-via-username-resolution-in-synology-chat
Discussion (0)
Add Comment
No comments yet. Be the first!