Description
OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability in the fetchWithGuard function that allocates entire response payloads in memory before enforcing maxBytes limits. Remote attackers can trigger memory exhaustion by serving oversized responses without content-length headers to cause availability loss.
Problem types
Allocation of Resources Without Limits or Throttling
Product status
Any version before 2026.2.14
Credits
Vincent Koc (@vincentkoc)
References
github.com/...enclaw/security/advisories/GHSA-j27p-hq53-9wgc (GitHub Security Advisory (GHSA-j27p-hq53-9wgc))
github.com/...ommit/00a08908892d1743d1fc52e5cbd9499dd5da2fe0 (Patch Commit)
www.vulncheck.com/...ce-via-unbounded-url-backed-media-fetch (VulnCheck Advisory: OpenClaw < 2026.2.14 - Denial of Service via Unbounded URL-backed Media Fetch)