Description
OpenClaw versions 2026.4.9 before 2026.4.10 contain a denial of service vulnerability in the voice-call realtime WebSocket path that accepts oversized frames without proper validation. Remote attackers can send oversized WebSocket frames to cause service unavailability for deployments exposing the webhook path.
Problem types
CWE-770: Allocation of Resources Without Limits or Throttling
Product status
2026.4.9 (semver) before 2026.4.10
2026.4.10 (semver)
Credits
G0odUser
References
github.com/...enclaw/security/advisories/GHSA-vw3h-q6xq-jjm5 (GitHub Security Advisory (GHSA-vw3h-q6xq-jjm5))
github.com/...ommit/afadb7dae6738819ad9c7d2597ace0516957d20e (Patch Commit)
www.vulncheck.com/...cket-frames-in-voice-call-realtime-path (VulnCheck Advisory: OpenClaw 2026.4.9 < 2026.4.10 - Denial of Service via Oversized WebSocket Frames in Voice-call Realtime Path)