Impact
The vulnerability is caused by the fetchWithGuard function allocating entire response payloads in memory before applying a maxBytes limit. Remote attackers can trigger memory exhaustion by sending oversized responses without content‑length headers, resulting in memory resource depletion and loss of availability. This weakness is catalogued as CWE‑770, an unbounded memory allocation in a denial of service scenario.
Affected Systems
OpenClaw versions earlier than 2026.2.14 are affected. The vulnerability exists in the OpenClaw application, which is built on Node.js platforms.
Risk and Exploitability
The CVSS base score is 8.7, indicating a high severity. The EPSS score is below 1 %, suggesting a low probability of exploitation at any given time, and the vulnerability is not listed in the CISA KEV catalog. Attackers would exploit the flaw remotely by initiating HTTP requests with very large bodies without content‑length headers, causing the server to consume excessive memory until it crashes or becomes unreachable.
OpenCVE Enrichment
Github GHSA