Description
OpenClaw versions prior to 2026.2.14 decode base64-backed media inputs into buffers before enforcing decoded-size budget limits, allowing attackers to trigger large memory allocations. Remote attackers can supply oversized base64 payloads to cause memory pressure and denial of service.
Problem types
Allocation of Resources Without Limits or Throttling
Product status
Any version before 2026.2.14
Credits
Vincent Koc (@vincentkoc)
References
github.com/...enclaw/security/advisories/GHSA-w2cg-vxx6-5xjg (GitHub Security Advisory (GHSA-w2cg-vxx6-5xjg))
github.com/...ommit/31791233d60495725fa012745dde8d6ee69e9595 (Patch Commit)
www.vulncheck.com/...vice-via-large-base-media-file-decoding (VulnCheck Advisory: OpenClaw < 2026.2.14 - Denial of Service via Large Base64 Media File Decoding)