Untriaged
Permalink
CVE-2026-28452
5.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
OpenClaw < 2026.2.14 - Denial of Service via Unguarded Archive Extraction in extractArchive
OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability in the extractArchive function within src/infra/archive.ts that allows attackers to consume excessive CPU, memory, and disk resources through high-expansion ZIP and TAR archives. Remote attackers can trigger resource exhaustion by providing maliciously crafted archive files during install or update operations, causing service degradation or system unavailability.
References
-
GitHub Security Advisory (GHSA-h89v-j3x9-8wqj) vendor-advisory
-
Patch Commit #1 patch
-
Patch Commit #2 patch
Affected products
OpenClaw
- <2026.2.14
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>