GHSA-mf5g-6r6f-ghhm

Suggest an improvement
Source
https://github.com/advisories/GHSA-mf5g-6r6f-ghhm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-mf5g-6r6f-ghhm/GHSA-mf5g-6r6f-ghhm.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-mf5g-6r6f-ghhm
Published
2026-03-29T15:50:09Z
Modified
2026-03-29T16:02:59.144784Z
Summary
OpenClaw: Synology Chat Webhook Pre-Auth Rate-Limit Bypass Enables Brute-Force Guessing of Webhook Token
Details

Summary

Synology Chat Webhook Pre-Auth Rate-Limit Bypass Enables Brute-Force Guessing of Weak Webhook Token

Affected Packages / Versions

  • Package: openclaw
  • Affected versions: <= 2026.3.24
  • First patched version: 2026.3.25
  • Latest published npm version at verification time: 2026.3.24

Details

Synology Chat webhook auth previously rejected invalid tokens without throttling repeated guesses, allowing brute-force attempts against weak webhook secrets. Commit 0b4d07337467f4d40a0cc1ced83d45ceaec0863c adds repeated-guess throttling before auth failure responses.

Verified vulnerable on tag v2026.3.24 and fixed on main by commit 0b4d07337467f4d40a0cc1ced83d45ceaec0863c.

Fix Commit(s)

  • 0b4d07337467f4d40a0cc1ced83d45ceaec0863c
Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2026-03-29T15:50:09Z",
    "severity": "MODERATE",
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-307",
        "CWE-521"
    ]
}
References

Affected packages

npm / openclaw

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2026.3.28

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-mf5g-6r6f-ghhm/GHSA-mf5g-6r6f-ghhm.json"
last_known_affected_version_range
"<= 2026.3.24"