GHSA-9528-x887-j2fp

Suggest an improvement
Source
https://github.com/advisories/GHSA-9528-x887-j2fp
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-9528-x887-j2fp/GHSA-9528-x887-j2fp.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-9528-x887-j2fp
Aliases
  • CVE-2026-33580
Downstream
Published
2026-03-31T23:59:17Z
Modified
2026-04-06T23:05:03.304726Z
Summary
OpenClaw's Nextcloud Talk webhook missing rate limiting on shared secret authentication
Details

Summary

Nextcloud Talk webhook signature failures were not throttled even though the integration relies on an operator-configured shared secret that may be weak.

Impact

An attacker who could reach the webhook endpoint could brute-force weak secrets online and then forge inbound webhook events.

Affected Component

extensions/nextcloud-talk/src/monitor.ts

Fixed Versions

  • Affected: <= 2026.3.24
  • Patched: >= 2026.3.28
  • Latest stable 2026.3.28 contains the fix.

Fix

Fixed by commit e403decb6e (nextcloud-talk: throttle repeated webhook auth failures).

OpenClaw thanks @AntAISecurityLab for reporting.

Database specific
{
    "cwe_ids": [
        "CWE-307"
    ],
    "github_reviewed_at": "2026-03-31T23:59:17Z",
    "nvd_published_at": null,
    "severity": "MODERATE",
    "github_reviewed": true
}
References

Affected packages

npm / openclaw

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2026.3.28

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-9528-x887-j2fp/GHSA-9528-x887-j2fp.json"
last_known_affected_version_range
"<= 2026.3.24"