Description
OpenClaw versions prior to 2026.2.15 contain a denial of service vulnerability in the web_fetch tool that allows attackers to crash the Gateway process through memory exhaustion by parsing oversized or deeply nested HTML responses. Remote attackers can social-engineer users into fetching malicious URLs with pathological HTML structures to exhaust server memory and cause service unavailability.
Published: 2026-03-05
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

OpenClaw versions prior to 2026.2.15 feature a flaw in the web_fetch tool that fails to limit the size or depth of HTML responses, allowing an attacker to cause memory exhaustion and force the Gateway process to terminate. This resource‑exhaustion weakness can be triggered by supplying a malicious URL that contains an unusually large or deeply nested HTML structure, which typically requires only social engineering to persuade a user or application to fetch the crafted content. The resulting denial of service impacts the availability of the OpenClaw gateway service for all users served by the affected instance.

Affected Systems

The vulnerability impacts all installations of the OpenClaw gateway running any version earlier than 2026.2.15, specifically the web_fetch component. Users who deploy OpenClaw on any operating system without a recent upgrade are potentially affected. No additional vendor or version details were provided beyond the upstream product name.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity, while the EPSS score of less than 1% implies a low likelihood of exploitation in the wild. The flaw is not listed in the CISA KEV catalog, suggesting no known active exploits at this time. The attack vector is remote, but it depends on social engineering or a phishing scenario to make legitimate users request the malicious URL. Once a request is made, the Gateway process can be forced into an out‑of‑memory state without requiring elevated privileges or local access.

Generated by OpenCVE AI on April 16, 2026 at 04:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.2.15 or later, which contains the patch for the web_fetch memory‑exhaustion flaw.
  • Restrict the web_fetch tool to only allow fetching URLs from a whitelist of trusted domains or from internal networks to limit exposure to malicious external content.
  • Configure the gateway process to enforce memory limits or run it in a sandboxed environment to contain possible resource exhaustion attacks.

Generated by OpenCVE AI on April 16, 2026 at 04:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-p536-vvpp-9mc8 OpenClaw has a Web Fetch DoS via unbounded response parsing
History

Wed, 11 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 22:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Thu, 05 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw versions prior to 2026.2.15 contain a denial of service vulnerability in the web_fetch tool that allows attackers to crash the Gateway process through memory exhaustion by parsing oversized or deeply nested HTML responses. Remote attackers can social-engineer users into fetching malicious URLs with pathological HTML structures to exhaust server memory and cause service unavailability.
Title OpenClaw < 2026.2.15 - Denial of Service via Unbounded Response Parsing in web_fetch Tool
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-770
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-11T13:35:37.639Z

Reserved: 2026-02-27T15:15:57.473Z

Link: CVE-2026-28394

cve-icon Vulnrichment

Updated: 2026-03-11T13:35:31.878Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T22:16:15.973

Modified: 2026-03-09T20:28:46.323

Link: CVE-2026-28394

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:45:16Z

Weaknesses