Description
OpenClaw before 2026.4.8 contains improper input validation in base64 decode paths that allocate memory before enforcing decoded-size limits. Attackers can exploit multiple code paths to cause memory exhaustion or denial of service through crafted base64-encoded input.
Problem types
CWE-770: Allocation of Resources Without Limits or Throttling
Product status
Any version before 2026.4.8
2026.4.8 (semver)
Credits
zsx (@zsxsoft)
KeenSecurityLab
References
github.com/...enclaw/security/advisories/GHSA-ccx3-fw7q-rr2r (GitHub Security Advisory (GHSA-ccx3-fw7q-rr2r))
github.com/...ommit/d7c3210cd6f5fdfdc1beff4c9541673e814354d5 (Patch Commit)
www.vulncheck.com/...mproper-base64-decoding-size-validation (VulnCheck Advisory: OpenClaw < 2026.4.8 - Improper Base64 Decoding Size Validation)