CVE-2026-28475

Publication date

2026-03-05 21:59:50

Family

VulnCheck

State

PUBLISHED

Description

OpenClaw versions prior to 2026.2.13 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing side-channels across multiple requests to gradually recover the authentication token.