Description
OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability in the extractArchive function within src/infra/archive.ts that allows attackers to consume excessive CPU, memory, and disk resources through high-expansion ZIP and TAR archives. Remote attackers can trigger resource exhaustion by providing maliciously crafted archive files during install or update operations, causing service degradation or system unavailability.
Problem types
Allocation of Resources Without Limits or Throttling
Product status
Any version before 2026.2.14
Credits
Vincent Koc (@vincentkoc)
References
github.com/...enclaw/security/advisories/GHSA-h89v-j3x9-8wqj (GitHub Security Advisory (GHSA-h89v-j3x9-8wqj))
github.com/...ommit/d3ee5deb87ee2ad0ab83c92c365611165423cb71 (Patch Commit #1)
github.com/...ommit/5f4b29145c236d124524c2c9af0f8acd048fbdea (Patch Commit #2)
www.vulncheck.com/...ed-archive-extraction-in-extractarchive (VulnCheck Advisory: OpenClaw < 2026.2.14 - Denial of Service via Unguarded Archive Extraction in extractArchive)