<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-41405 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-41405/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-41405/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw MS Teams Webhook Resource Exhaustion Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-resource-exhaustion/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-resource-exhaustion/</guid><description>OpenClaw before 2026.3.31 parses MS Teams webhook request bodies before performing JWT validation, allowing unauthenticated attackers to exhaust server resources by sending malicious Teams webhook payloads.</description><content:encoded><![CDATA[<p>OpenClaw before version 2026.3.31 is vulnerable to a resource exhaustion attack due to improper handling of MS Teams webhook requests. The application parses the request body before validating the JWT, which allows unauthenticated attackers to send malicious payloads. By sending specially crafted Teams webhook payloads, attackers can bypass authentication checks and exhaust server resources. This vulnerability, identified as CVE-2026-41405, can lead to denial of service and impacts systems where OpenClaw is used to process MS Teams webhooks. Successful exploitation can severely degrade or halt OpenClaw&rsquo;s functionality.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies an OpenClaw instance processing MS Teams webhooks.</li>
<li>The attacker crafts a malicious MS Teams webhook payload designed to consume excessive resources during parsing.</li>
<li>The attacker sends the malicious webhook payload to the OpenClaw endpoint.</li>
<li>OpenClaw receives the webhook request and begins parsing the request body <em>before</em> JWT validation.</li>
<li>The malicious payload triggers excessive resource consumption (CPU, memory) during the parsing stage.</li>
<li>The parsing process exhausts available server resources.</li>
<li>OpenClaw becomes unresponsive or crashes due to resource exhaustion.</li>
<li>Legitimate MS Teams webhook requests are no longer processed, leading to a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to a denial-of-service condition, rendering OpenClaw unresponsive. This can disrupt any services relying on OpenClaw for MS Teams webhook processing. While the precise number of affected organizations is unknown, any organization using a vulnerable version of OpenClaw is at risk. The impact includes potential loss of data, interrupted workflows, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.31 or later to patch CVE-2026-41405.</li>
<li>Implement rate limiting on the MS Teams webhook endpoint to mitigate resource exhaustion, even after patching.</li>
<li>Monitor web server logs (category <code>webserver</code>, product <code>linux</code>) for unusual traffic patterns and large request sizes to the MS Teams webhook endpoint.</li>
<li>Deploy the Sigma rule <code>Detect High Number of Requests to Teams Webhook</code> to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>resource-exhaustion</category><category>webhook</category><category>cve-2026-41405</category></item></channel></rss>