CVE-2026-32980: OpenClaw Telegram webhook request bodies were read before secret validation, enabling unauthenticated resource exhaustion
(updated )
openclaw versions <= 2026.3.12 read and buffered Telegram webhook request bodies before validating x-telegram-bot-api-secret-token. This let unauthenticated callers force up to the configured webhook body limit of pre-auth body I/O and JSON parse work per request.
References
- github.com/advisories/GHSA-jq3f-vjww-8rq7
- github.com/openclaw/openclaw
- github.com/openclaw/openclaw/commit/7e49e98f79073b11134beac27fdff547ba5a4a02
- github.com/openclaw/openclaw/security/advisories/GHSA-jq3f-vjww-8rq7
- nvd.nist.gov/vuln/detail/CVE-2026-32980
- www.vulncheck.com/advisories/openclaw-resource-exhaustion-via-unauthenticated-telegram-webhook-request
Code Behaviors & Features
Detect and mitigate CVE-2026-32980 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →