Home

Description

OpenClaw versions prior to 2026.2.14 decode base64-backed media inputs into buffers before enforcing decoded-size budget limits, allowing attackers to trigger large memory allocations. Remote attackers can supply oversized base64 payloads to cause memory pressure and denial of service.

PUBLISHED Reserved 2026-03-04 | Published 2026-03-05 | Updated 2026-03-05 | Assigner VulnCheck




MEDIUM: 6.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
MEDIUM: 5.5CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Problem types

Allocation of Resources Without Limits or Throttling

Product status

Default status
unaffected

Any version before 2026.2.14
affected

Credits

Vincent Koc (@vincentkoc) reporter

References

github.com/...enclaw/security/advisories/GHSA-w2cg-vxx6-5xjg (GitHub Security Advisory (GHSA-w2cg-vxx6-5xjg)) vendor-advisory

github.com/...ommit/31791233d60495725fa012745dde8d6ee69e9595 (Patch Commit) patch

www.vulncheck.com/...vice-via-large-base-media-file-decoding (VulnCheck Advisory: OpenClaw < 2026.2.14 - Denial of Service via Large Base64 Media File Decoding) third-party-advisory

cve.org (CVE-2026-29612)

nvd.nist.gov (CVE-2026-29612)

Download JSON