CVE-2026-28464

Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
05/03/2026
Last modified:
09/03/2026

Description

OpenClaw versions prior to 2026.2.12 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing side-channels across multiple requests to gradually determine the authentication token.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* 2026.2.12 (excluding)