The openclaw npm package processed incoming Feishu webhook request bodies in full before validating request signatures, meaning any unauthenticated attacker could trigger expensive JSON parsing operations at will. The barrier to exploitation is trivially low — a simple flood of crafted POST requests to the webhook endpoint is sufficient, no credentials or AI/ML knowledge required. No public exploit code exists and this is not in CISA KEV, but the package's broader security record of 67 CVEs signals systemic hygiene problems that elevate organizational risk beyond this single finding. Upgrade to openclaw 2026.3.25 or later immediately, and rate-limit webhook endpoints at the reverse proxy or WAF layer as defense-in-depth while patching.
Risk Assessment
Medium risk in isolation, elevated in organizational context. The vulnerability requires no credentials and no specialized knowledge — any attacker with network access to the webhook endpoint can trigger resource consumption. No public exploit code, no active exploitation observed, and no EPSS data available. The package's track record of 67 CVEs against the same codebase indicates structural security debt that organizations relying on openclaw for production AI agent workflows should treat as a systemic supplier risk, not just an isolated patch event.
Attack Kill Chain
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| openclaw | npm | < 2026.3.28 | 2026.3.28 |
Do you use openclaw? You're affected.
Severity & Risk
Recommended Action
- Upgrade openclaw to version 2026.3.25 or later (fix commit: 5e8cb22176e9235e224be0bc530699261eb60e53 reorders logic to validate signature before parsing).
- As a temporary workaround pre-patch, enforce aggressive rate limiting on Feishu webhook endpoints at the reverse proxy, load balancer, or WAF layer.
- Restrict webhook endpoint exposure to Feishu's published source IP ranges only — do not expose to open internet.
- Given the package's 67-CVE history, conduct a dependency risk review: evaluate whether openclaw is a viable long-term dependency for production AI agent workloads or warrants replacement.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2026-35640?
The openclaw npm package processed incoming Feishu webhook request bodies in full before validating request signatures, meaning any unauthenticated attacker could trigger expensive JSON parsing operations at will. The barrier to exploitation is trivially low — a simple flood of crafted POST requests to the webhook endpoint is sufficient, no credentials or AI/ML knowledge required. No public exploit code exists and this is not in CISA KEV, but the package's broader security record of 67 CVEs signals systemic hygiene problems that elevate organizational risk beyond this single finding. Upgrade to openclaw 2026.3.25 or later immediately, and rate-limit webhook endpoints at the reverse proxy or WAF layer as defense-in-depth while patching.
Is CVE-2026-35640 actively exploited?
No confirmed active exploitation of CVE-2026-35640 has been reported, but organizations should still patch proactively.
How to fix CVE-2026-35640?
1. Upgrade openclaw to version 2026.3.25 or later (fix commit: 5e8cb22176e9235e224be0bc530699261eb60e53 reorders logic to validate signature before parsing). 2. As a temporary workaround pre-patch, enforce aggressive rate limiting on Feishu webhook endpoints at the reverse proxy, load balancer, or WAF layer. 3. Restrict webhook endpoint exposure to Feishu's published source IP ranges only — do not expose to open internet. 4. Given the package's 67-CVE history, conduct a dependency risk review: evaluate whether openclaw is a viable long-term dependency for production AI agent workloads or warrants replacement.
What systems are affected by CVE-2026-35640?
This vulnerability affects the following AI/ML architecture patterns: agent frameworks, webhook integrations, event-driven AI pipelines.
What is the CVSS score for CVE-2026-35640?
No CVSS score has been assigned yet.
Technical Details
NVD Description
## Summary Feishu webhook reads and parses unauthenticated request bodies before signature validation ## Affected Packages / Versions - Package: `openclaw` - Affected versions: `<= 2026.3.24` - First patched version: `2026.3.25` - Latest published npm version at verification time: `2026.3.24` ## Details Feishu webhook handling previously parsed JSON before signature validation, which let unauthenticated callers force full JSON parsing work before rejection. Commit `5e8cb22176e9235e224be0bc530699261eb60e53` reads the raw request body, validates the signature first, and only then parses JSON. Verified vulnerable on tag `v2026.3.24` and fixed on `main` by commit `5e8cb22176e9235e224be0bc530699261eb60e53`. ## Fix Commit(s) - `5e8cb22176e9235e224be0bc530699261eb60e53`
Exploitation Scenario
An adversary identifies that a target organization's openclaw-powered AI agent exposes a Feishu webhook endpoint publicly. Without any credentials, they run a script that floods the endpoint with POST requests containing deeply nested or maximally large JSON payloads. Each request triggers full JSON deserialization on the server before the signature check rejects it. Under sustained load, the server's parsing threads saturate, causing the AI agent to become unresponsive to legitimate Feishu events — effectively blinding the agent to incoming triggers and halting any downstream automated workflows, tool invocations, or multi-agent coordination that depends on Feishu as a signal source.
Weaknesses (CWE)
References
- github.com/advisories/GHSA-3h52-cx59-c456
- github.com/openclaw/openclaw/commit/5e8cb22176e9235e224be0bc530699261eb60e53
- github.com/openclaw/openclaw/security/advisories/GHSA-3h52-cx59-c456
- nvd.nist.gov/vuln/detail/CVE-2026-35640
- vulncheck.com/advisories/openclaw-denial-of-service-via-unauthenticated-webhook-request-parsing
Timeline
Related Vulnerabilities
CVE-2026-30741 9.8 OpenClaw: RCE via request-side prompt injection
Same package: openclaw CVE-2026-28451 9.3 OpenClaw: SSRF via Feishu extension exposes internal services
Same package: openclaw GHSA-m3mh-3mpg-37hw 8.6 OpenClaw: .npmrc hijack enables RCE on plugin install
Same package: openclaw CVE-2026-27001 7.8 OpenClaw: prompt injection via unsanitized workspace path
Same package: openclaw GHSA-hr5v-j9h9-xjhg 7.7 OpenClaw: sandbox escape via mediaUrl path traversal
Same package: openclaw
AI Threat Alert