Synology Chat Webhook Pre-Auth Rate-Limit Bypass Enables Brute-Force Guessing of Weak Webhook Token
openclaw<= 2026.3.242026.3.252026.3.24Synology Chat webhook auth previously rejected invalid tokens without throttling repeated guesses, allowing brute-force attempts against weak webhook secrets. Commit 0b4d07337467f4d40a0cc1ced83d45ceaec0863c adds repeated-guess throttling before auth failure responses.
Verified vulnerable on tag v2026.3.24 and fixed on main by commit 0b4d07337467f4d40a0cc1ced83d45ceaec0863c.
0b4d07337467f4d40a0cc1ced83d45ceaec0863c{
"github_reviewed": true,
"github_reviewed_at": "2026-03-29T15:50:09Z",
"severity": "MODERATE",
"nvd_published_at": null,
"cwe_ids": [
"CWE-307",
"CWE-521"
]
}