Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. openclaw
  4. ›
  5. GHSA-mf69-r24q-ghhr

GHSA-mf69-r24q-ghhr: Duplicate Advisory: OpenClaw: Pairing pending-request caps were enforced per channel instead of per account

April 24, 2026 (updated May 4, 2026)

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-wwfp-w96m-c6x8. This link is maintained to preserve external references.

Original Description

OpenClaw 2026.2.26 before 2026.3.31 enforces pending pairing-request caps per channel file instead of per account, allowing attackers to exhaust the shared pending window. Remote attackers can submit pairing requests from other accounts to block new pairing challenges on unaffected accounts, causing denial of service.

References

  • github.com/advisories/GHSA-mf69-r24q-ghhr
  • github.com/openclaw/openclaw/commit/9bc1f896c8cd325dd4761681e9bdb8c425f69785
  • github.com/openclaw/openclaw/security/advisories/GHSA-wwfp-w96m-c6x8
  • nvd.nist.gov/vuln/detail/CVE-2026-41346
  • www.vulncheck.com/advisories/openclaw-denial-of-service-via-improper-pending-pairing-request-cap-enforcement

Code Behaviors & Features

Detect and mitigate GHSA-mf69-r24q-ghhr with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2026.2.26 before 2026.3.31

Fixed versions

  • 2026.3.31

Solution

Upgrade to version 2026.3.31 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Learn more about CVSS

Weakness

  • CWE-799: Improper Control of Interaction Frequency

Source file

npm/openclaw/GHSA-mf69-r24q-ghhr.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:15 +0000.