Impact
OpenClaw versions 2026.2.21‑2, as well as the openclaw/voice‑call 2026.2.21 module, allow media‑stream WebSocket upgrades to be accepted before the stream is validated. This permits unauthenticated clients to establish connections that remain open for the duration of the attack. Remote attackers can keep idle pre‑authenticated sockets open, consuming server connection resources and degrading service availability for legitimate streams. The flaw is a resource exhaustion vulnerability (CWE‑770).
Affected Systems
OpenClaw’s primary product, the OpenClaw platform, and its voice‑call component (openclaw:voice‑call) are affected. Versions 2026.2.21‑2 of the main application and 2026.2.21 of the voice‑call module are vulnerable; upgrading to version 2026.2.22 or later resolves the issue.
Risk and Exploitability
The CVSS base score of 8.7 classifies the issue as high severity, while the EPSS score of less than 1% indicates a relatively low likelihood of seeing an active exploitation. The vulnerability is not yet listed in the CISA KEV catalog, suggesting no known widespread exploitation. Attackers need not authenticate; any client able to reach the media‑stream WebSocket endpoint can abuse the flaw simply by opening and keeping the connection idle, making the attack vector likely to be network‑based.
OpenCVE Enrichment
Github GHSA