Duplicate Advisory: OpenClaw Telegram webhook request bodies were read before secret validation, enabling unauthenticated resource exhaustion
High severity
GitHub Reviewed
Published
Mar 29, 2026
to the GitHub Advisory Database
•
Updated Apr 1, 2026
Withdrawn
This advisory was withdrawn on Apr 1, 2026
Description
Published by the National Vulnerability Database
Mar 29, 2026
Published to the GitHub Advisory Database
Mar 29, 2026
Reviewed
Apr 1, 2026
Withdrawn
Apr 1, 2026
Last updated
Apr 1, 2026
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-jq3f-vjww-8rq7. This link is maintained to preserve external references.
Original Description
OpenClaw before 2026.3.13 reads and buffers Telegram webhook request bodies before validating the x-telegram-bot-api-secret-token header, allowing unauthenticated attackers to exhaust server resources. Attackers can send POST requests to the webhook endpoint to force memory consumption, socket time, and JSON parsing work before authentication validation occurs.
References