GHSA-RXXP-482V-7MRH: Memory Exhaustion via Unbounded Media Buffering in OpenClaw
Vulnerability ID: GHSA-RXXP-482V-7MRH
CVSS Score: 6.5
Published: 2026-03-02
OpenClaw, an open-source personal AI assistant framework, contains a Denial of Service (DoS) vulnerability in multiple messaging channel extensions (including Discord, Telegram, and Microsoft Teams). The vulnerability arises from improper handling of inbound media attachments, where the application buffers the entire content of a remote file into memory before verifying its size against configured limits. This 'sink-then-check' behavior allows remote attackers to trigger an Out-of-Memory (OOM) exception and crash the Node.js process by sending a sufficiently large file or a continuous data stream.
TL;DR
OpenClaw extensions download full media files into RAM before checking size limits. Attackers can crash the service by sending large files (DoS). Fixed versions enforce limits during the download stream.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-770
- Attack Vector: Network
- CVSS Score: 6.5 (Medium)
- Impact: Denial of Service (OOM)
- Platform: Node.js
- Exploit Status: PoC Available
Affected Systems
- OpenClaw Discord Extension
- OpenClaw Telegram Extension
- OpenClaw Microsoft Teams Extension
- OpenClaw BlueBubbles Extension
- OpenClaw Zalo Extension
-
openclaw: < 2026-02-21 (Fixed in:
commit 73d93dee64127a26f1acd09d0403b794cdeb4f5c)
Code Analysis
Commit: 73d93de
fix: use fetchRemoteMedia for proper size limit enforcement
Diff shows removal of raw 'fetch' and 'arrayBuffer' calls, replaced with 'runtime.channel.media.fetchRemoteMedia'.
Mitigation Strategies
- Update to the patched version of OpenClaw.
- Configure 'maxBytes' limits for all media handlers.
- Restrict bot access to trusted users/channels.
Remediation Steps:
- Stop the running OpenClaw instance.
- Run 'npm update openclaw' to pull the latest package versions.
- Verify the installation of the patch commit 73d93dee64127a26f1acd09d0403b794cdeb4f5c.
- Restart the service.
- Monitor logs for 'fetchRemoteMedia' activity to ensure the new logic is active.
References
Read the full report for GHSA-RXXP-482V-7MRH on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)