OpenClaw: Synology Chat Webhook Pre-Auth Rate-Limit Bypass Enables Brute-Force Guessing of Webhook Token
Moderate severity
GitHub Reviewed
Published
Mar 26, 2026
in
openclaw/openclaw
•
Updated Apr 10, 2026
Description
Published to the GitHub Advisory Database
Mar 29, 2026
Reviewed
Mar 29, 2026
Last updated
Apr 10, 2026
Summary
Synology Chat Webhook Pre-Auth Rate-Limit Bypass Enables Brute-Force Guessing of Weak Webhook Token
Affected Packages / Versions
openclaw<= 2026.3.242026.3.252026.3.24Details
Synology Chat webhook auth previously rejected invalid tokens without throttling repeated guesses, allowing brute-force attempts against weak webhook secrets. Commit
0b4d07337467f4d40a0cc1ced83d45ceaec0863cadds repeated-guess throttling before auth failure responses.Verified vulnerable on tag
v2026.3.24and fixed onmainby commit0b4d07337467f4d40a0cc1ced83d45ceaec0863c.Fix Commit(s)
0b4d07337467f4d40a0cc1ced83d45ceaec0863cReferences