The vulnerability, identified as GHSA-qcc3-jqwp-5vh2, is a resource exhaustion issue in the LINE webhook handler of OpenClaw. The root cause is the absence of a concurrency limit on the webhook endpoint before the request body is read and the signature is verified. An attacker could exploit this by sending a high volume of concurrent POST requests to the webhook, forcing the server to allocate resources for each request to read the body and perform cryptographic signature verification. This would lead to resource exhaustion and a denial of service for legitimate users.
The analysis of the patch commit 57c47d8c7fbf5a2e70cc4dec2380977968903cad confirms this. The changes in extensions/line/src/monitor.ts within the monitorLineProvider function show the introduction of a concurrency limiting mechanism. Previously, the route handler was directly assigned the function returned by createLineNodeWebhookHandler. The patch wraps this in a new handler that uses beginWebhookRequestPipelineOrReject to limit the number of in-flight requests before they are passed to the actual processing logic.
The function createLineNodeWebhookHandler in extensions/line/src/webhook-node.ts is also implicated as it creates the handler where the expensive, pre-authentication processing occurs. Therefore, during an exploit, profilers would show significant time spent within the anonymous handler function created by createLineNodeWebhookHandler, which is orchestrated and set up by monitorLineProvider.