CVE-2026-28475

MEDIUM

OpenClaw <2026.2.13 - Info Disclosure

Title source: llm
STIX 2.1

Description

OpenClaw versions prior to 2026.2.13 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing side-channels across multiple requests to gradually recover the authentication token.

Scores

CVSS v3 4.8
EPSS 0.0013
EPSS Percentile 32.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-208
Status published
Products (2)
npm/openclaw 0 - 2026.2.13npm
openclaw/openclaw < 2026.2.13
Published Mar 05, 2026
Tracked Since Mar 06, 2026