Skip to content
Threat Feed

Tag

Webhook

7 briefs RSS
high advisory

Paid Memberships Pro Plugin Vulnerability Allows Unauthorized Stripe Webhook Modification

The Paid Memberships Pro plugin for WordPress is vulnerable to unauthorized modification of Stripe webhook configurations due to missing capability checks, allowing authenticated attackers with Subscriber-level access to disrupt payment processing.

Paid Memberships Pro plugin wordpress stripe webhook vulnerability plugin
2r 3t 1c
medium advisory

OpenClaw Webhook Replay Vulnerability (CVE-2026-41395)

OpenClaw before 2026.3.28 is vulnerable to webhook replay attacks due to improper signature verification, allowing attackers to reorder query parameters and trigger duplicate voice-call processing.

OpenClaw webhook replay-attack plivo
2r 1t 1c
medium advisory

OpenClaw MS Teams Webhook Resource Exhaustion Vulnerability

OpenClaw before 2026.3.31 parses MS Teams webhook request bodies before performing JWT validation, allowing unauthenticated attackers to exhaust server resources by sending malicious Teams webhook payloads.

OpenClaw resource-exhaustion webhook cve-2026-41405
1r 1c
critical advisory

Stripe Webhook Signature Bypass via Empty Secret Enables Unlimited Quota Fraud

A vulnerability in the Stripe webhook handler allows an unauthenticated attacker to forge webhook events and credit arbitrary quota to their account without payment, stemming from an empty StripeWebhookSecret and lack of PaymentMethod validation, enabling cross-gateway exploitation.

Stripe Webhook stripe webhook signature-bypass quota-fraud
2r 1t
critical advisory

Budibase Unauthenticated Remote Code Execution via Webhook

Budibase versions before 3.33.4 are susceptible to unauthenticated remote code execution, where a threat actor can trigger a Bash step within an automation via the public webhook endpoint, leading to code execution as root within the container.

CVE-2026-35216 budibase rce webhook
2r 1t 1c
critical advisory

OpenClaw Webhook Rate Limit Bypass Vulnerability (CVE-2026-34505)

OpenClaw before 2026.3.12 applies rate limiting only after successful webhook authentication, allowing attackers to bypass rate limits and brute-force webhook secrets leading to forged webhook submission.

rate-limiting brute-force webhook cve-2026-34505
2r 1t 1c 1i
high advisory

OpenClaw Feishu Webhook Authentication Bypass (CVE-2026-32974)

OpenClaw before 2026.3.12 is vulnerable to an authentication bypass in Feishu webhook mode when only verificationToken is configured without encryptKey, allowing unauthenticated network attackers to inject forged Feishu events and trigger downstream tool execution.

authentication-bypass webhook cve-2026-32974
2r 1t