Description
OpenClaw versions prior to 2026.2.14 decode base64-backed media inputs into buffers before enforcing decoded-size budget limits, allowing attackers to trigger large memory allocations. Remote attackers can supply oversized base64 payloads to cause memory pressure and denial of service.
Published: 2026-03-05
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via excessive memory allocation
Action: Apply Patch
AI Analysis

Impact

OpenClaw prior to 2026.2.14 decodes Base64‑backed media inputs into memory buffers before verifying that the resulting decoded size stays within allowed limits, which enables an attacker to trigger large memory allocations. The resulting excessive memory consumption can exhaust system resources and cause the application to become unresponsive or crash, yielding a denial of service for legitimate users.

Affected Systems

The vulnerability affects OpenClaw software versions before 2026.2.14. No specific sub‑module is identified beyond the media decoding component within the OpenClaw application.

Risk and Exploitability

The vulnerability scores a CVSS of 6.8, indicating moderate severity, yet the EPSS score is less than 1% and it is not listed in the CISA KEV catalog, suggesting a low probability of public exploitation. Nevertheless, the attack vector is remote, as an attacker can send a crafted large Base64 payload over the network to invoke the overflow. Once triggered, the allocation of a large buffer could cause memory pressure and lead to a denial of service without elevating privileges or compromising confidentiality.

Generated by OpenCVE AI on April 16, 2026 at 11:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the OpenClaw 2026.2.14 update or later to remove the insecure decode path.
  • If an upgrade cannot be applied immediately, enforce an upper bound on media upload size at the application or network layer to reject excessively large Base64 payloads.
  • Monitor system memory usage for unusual spikes and configure request body limits to mitigate the impact of any residual allocation anomalies.

Generated by OpenCVE AI on April 16, 2026 at 11:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-w2cg-vxx6-5xjg OpenClaw: denial of service through large base64 media files allocating large buffers before limit checks
History

Mon, 09 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 22:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Thu, 05 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw versions prior to 2026.2.14 decode base64-backed media inputs into buffers before enforcing decoded-size budget limits, allowing attackers to trigger large memory allocations. Remote attackers can supply oversized base64 payloads to cause memory pressure and denial of service.
Title OpenClaw < 2026.2.14 - Denial of Service via Large Base64 Media File Decoding
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-770
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-09T18:16:12.427Z

Reserved: 2026-03-04T16:16:15.968Z

Link: CVE-2026-29612

cve-icon Vulnrichment

Updated: 2026-03-09T18:16:07.452Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-03-05T22:16:24.660

Modified: 2026-03-11T00:47:39.460

Link: CVE-2026-29612

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:00:11Z

Weaknesses