<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-32974 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-32974/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 29 Mar 2026 13:17:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-32974/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Feishu Webhook Authentication Bypass (CVE-2026-32974)</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-auth-bypass/</link><pubDate>Sun, 29 Mar 2026 13:17:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-auth-bypass/</guid><description>OpenClaw before 2026.3.12 is vulnerable to an authentication bypass in Feishu webhook mode when only verificationToken is configured without encryptKey, allowing unauthenticated network attackers to inject forged Feishu events and trigger downstream tool execution.</description><content:encoded><![CDATA[<p>OpenClaw before version 2026.3.12 is susceptible to an authentication bypass vulnerability (CVE-2026-32974) affecting Feishu webhook integrations. This vulnerability arises when the <code>verificationToken</code> is configured without the <code>encryptKey</code>. This configuration flaw enables unauthenticated attackers to forge Feishu events and send them to the webhook endpoint. Successful exploitation allows attackers to trigger arbitrary downstream tool execution within the OpenClaw environment. This is a…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication-bypass</category><category>webhook</category><category>cve-2026-32974</category></item></channel></rss>