Tag
Paid Memberships Pro Plugin Vulnerability Allows Unauthorized Stripe Webhook Modification
2 rules 3 TTPs 1 CVEThe Paid Memberships Pro plugin for WordPress is vulnerable to unauthorized modification of Stripe webhook configurations due to missing capability checks, allowing authenticated attackers with Subscriber-level access to disrupt payment processing.
OpenClaw Webhook Replay Vulnerability (CVE-2026-41395)
2 rules 1 TTP 1 CVEOpenClaw before 2026.3.28 is vulnerable to webhook replay attacks due to improper signature verification, allowing attackers to reorder query parameters and trigger duplicate voice-call processing.
OpenClaw MS Teams Webhook Resource Exhaustion Vulnerability
1 rule 1 CVEOpenClaw before 2026.3.31 parses MS Teams webhook request bodies before performing JWT validation, allowing unauthenticated attackers to exhaust server resources by sending malicious Teams webhook payloads.
Stripe Webhook Signature Bypass via Empty Secret Enables Unlimited Quota Fraud
2 rules 1 TTPA vulnerability in the Stripe webhook handler allows an unauthenticated attacker to forge webhook events and credit arbitrary quota to their account without payment, stemming from an empty StripeWebhookSecret and lack of PaymentMethod validation, enabling cross-gateway exploitation.
Budibase Unauthenticated Remote Code Execution via Webhook
2 rules 1 TTP 1 CVEBudibase versions before 3.33.4 are susceptible to unauthenticated remote code execution, where a threat actor can trigger a Bash step within an automation via the public webhook endpoint, leading to code execution as root within the container.
OpenClaw Webhook Rate Limit Bypass Vulnerability (CVE-2026-34505)
2 rules 1 TTP 1 CVE 1 IOCOpenClaw before 2026.3.12 applies rate limiting only after successful webhook authentication, allowing attackers to bypass rate limits and brute-force webhook secrets leading to forged webhook submission.
OpenClaw Feishu Webhook Authentication Bypass (CVE-2026-32974)
2 rules 1 TTPOpenClaw before 2026.3.12 is vulnerable to an authentication bypass in Feishu webhook mode when only verificationToken is configured without encryptKey, allowing unauthenticated network attackers to inject forged Feishu events and trigger downstream tool execution.