Impact
OpenClaw versions before 2026.2.13 allow an attacker to trigger a denial of service by sending large or slow JSON payloads to webhook endpoints, causing the application to buffer the entire request body without limits and exhaust memory. The flaw results in application slowdown or crash, impacting service availability.
Affected Systems
The vulnerability affects the OpenClaw web framework. All installations of OpenClaw on Node.js environments running any version earlier than 2026.2.13 are impacted. No specific OS or platform restrictions are listed, but the flaw exists in the generic OpenClaw webhook module.
Risk and Exploitability
The CVSS score of 8.7 denotes high severity, while an EPSS score of less than 1% indicates a very low likelihood of exploitation in the wild. The vulnerability is not currently listed in CISA’s KEV catalog, so no public exploits are known. Attackers can reach the affected endpoints over the network without authentication, so the attack vector is remote, uncontrolled. Usually, the attack requires sending an oversized request or performing a slow POST, which leads to excessive memory usage and potential service interruption.
OpenCVE Enrichment
Github GHSA