CVE-2026-41913: OpenClaw: Concurrent async auth attempts can bypass the intended shared-secret rate-limit budget on Tailscale-capable paths
(updated )
Concurrent async auth attempts can bypass the intended shared-secret rate-limit budget on Tailscale-capable paths.
Concurrent asynchronous shared-secret auth attempts could race the per-key rate-limit budget.
OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenant service boundary.
References
- github.com/advisories/GHSA-25wv-8phj-8p7r
- github.com/openclaw/openclaw
- github.com/openclaw/openclaw/commit/d7c3210cd6f5fdfdc1beff4c9541673e814354d5
- github.com/openclaw/openclaw/security/advisories/GHSA-25wv-8phj-8p7r
- nvd.nist.gov/vuln/detail/CVE-2026-41913
- www.vulncheck.com/advisories/openclaw-rate-limit-bypass-via-concurrent-async-authentication-attempts
Code Behaviors & Features
Detect and mitigate CVE-2026-41913 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →