| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xc7w-v5x6-cc87 | OpenClaw has a webhook auth bypass when gateway is behind a reverse proxy (loopback remoteAddress trust) |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 06 Mar 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 05 Mar 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.2.12 contain a vulnerability in the BlueBubbles (optional plugin) webhook handler in which it authenticates requests based solely on loopback remoteAddress without validating forwarding headers, allowing bypass of configured webhook passwords. When the gateway operates behind a reverse proxy, unauthenticated remote attackers can inject arbitrary BlueBubbles message and reaction events by reaching the proxy endpoint. | |
| Title | OpenClaw < 2026.2.12 - Webhook Authentication Bypass via Loopback remoteAddress Trust | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-306 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-06T16:46:30.372Z
Reserved: 2026-03-04T16:16:15.968Z
Link: CVE-2026-29613
No data.
Status : Received
Published: 2026-03-05T22:16:24.850
Modified: 2026-03-06T17:16:35.300
Link: CVE-2026-29613
No data.
OpenCVE Enrichment
Updated: 2026-03-06T14:56:46Z
Github GHSA