GHSA-xq8g-hgh6-87hv: Missing Rate Limiting in OpenClaw BlueBubbles Webhook Enables Brute-Force Attacks
Vulnerability ID: GHSA-XQ8G-HGH6-87HV
CVSS Score: 5.3
Published: 2026-03-27
The OpenClaw package before version 2026.3.25 fails to restrict the rate of incoming authentication attempts on its BlueBubbles webhook endpoint. This lack of rate limiting allows unauthenticated remote attackers to perform high-speed brute-force attacks against the webhook password, potentially resulting in unauthorized message processing and data access.
TL;DR
OpenClaw versions up to 2026.3.24 lack rate limiting on the BlueBubbles webhook endpoint. Attackers can brute-force the webhook authentication password to gain unauthorized access. Upgrading to version 2026.3.25 resolves the issue by implementing a fixed-window rate limiter.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-307
- Attack Vector: Network
- Authentication Required: None
- Impact: Unauthorized Access
- Exploit Status: Proof of Concept
- Patched Version: 2026.3.25
Affected Systems
- openclaw npm package (<= 2026.3.24)
-
openclaw: <= 2026.3.24 (Fixed in:
2026.3.25)
Code Analysis
Commit: 5e08ce3
Implemented fixed window rate limiter for webhook auth to prevent brute force attacks.
Exploit Details
- OpenClaw Test Suite: Integration test monitor.webhook-auth.test.ts simulating 130 authentication requests to validate rate limits.
Mitigation Strategies
- Upgrade the openclaw package to version 2026.3.25 or later.
- Enforce strong, high-entropy passwords for webhook authentication to mathematically defeat brute-force attempts.
- Configure trusted proxies in the gateway settings to ensure accurate client IP resolution for rate limiting.
Remediation Steps:
- Update dependencies in package.json to require openclaw ^2026.3.25.
- Run 'npm install' or 'yarn install' to apply the updated package.
- Review network architecture to identify upstream reverse proxies or load balancers.
- Update OpenClaw configuration to explicitly define upstream proxy IP ranges in the 'trustedProxies' setting.
- Restart the OpenClaw service to ensure configuration changes and updated code take effect.
References
- GitHub Security Advisory GHSA-xq8g-hgh6-87hv
- Fix Commit 5e08ce36d522a1c96df2bfe88e39303ae2643d92
- OSV Record GHSA-xq8g-hgh6-87hv
- OpenClaw Repository
Read the full report for GHSA-XQ8G-HGH6-87HV on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)