BlueBubbles Webhook Missing Guess Rate Limiting Enables Brute-Force Guessing of Weak Webhook Password
openclaw<= 2026.3.242026.3.252026.3.24BlueBubbles webhook auth previously rejected wrong passwords without throttling repeated guesses, allowing brute-force attempts against weak webhook passwords. Commit 5e08ce36d522a1c96df2bfe88e39303ae2643d92 adds repeated-guess throttling before auth failure responses.
Verified vulnerable on tag v2026.3.24 and fixed on main by commit 5e08ce36d522a1c96df2bfe88e39303ae2643d92.
5e08ce36d522a1c96df2bfe88e39303ae2643d92{
"github_reviewed": true,
"github_reviewed_at": "2026-03-27T22:31:19Z",
"cwe_ids": [
"CWE-307",
"CWE-521"
],
"severity": "MODERATE",
"nvd_published_at": null
}