Untriaged
Permalink
CVE-2026-32049
7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
OpenClaw < 2026.2.22 - Denial of Service via Inbound Media Download Byte Limit Bypass
OpenClaw versions prior to 2026.2.22 fail to consistently enforce configured inbound media byte limits before buffering remote media across multiple channel ingestion paths. Remote attackers can send oversized media payloads to trigger elevated memory usage and potential process instability.
References
-
GitHub Security Advisory (GHSA-rxxp-482v-7mrh) third-party-advisory
-
Patch Commit patch
Affected products
OpenClaw
- <2026.2.22
- ==2026.2.22
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>