Untriaged
Permalink
CVE-2026-28478
7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
OpenClaw < 2026.2.13 - Denial of Service via Unbounded Webhook Request Body Buffering
OpenClaw versions prior to 2026.2.13 contain a denial of service vulnerability in webhook handlers that buffer request bodies without strict byte or time limits. Remote unauthenticated attackers can send oversized JSON payloads or slow uploads to webhook endpoints causing memory pressure and availability degradation.
References
-
GitHub Security Advisory (GHSA-q447-rj3r-2cgh) vendor-advisory
-
Patch Commit patch
Affected products
OpenClaw
- <2026.2.13
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>