OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability in the extractArchive function within src/infra/archive.ts that allows attackers to consume excessive CPU, memory, and disk resources through high-expansion ZIP and TAR archives. Remote attackers can trigger resource exhaustion by providing maliciously crafted archive files during install or update operations, causing service degradation or system unavailability.
References
Configurations
History
09 Mar 2026, 18:30
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
|
| References | () https://github.com/openclaw/openclaw/commit/5f4b29145c236d124524c2c9af0f8acd048fbdea - Patch | |
| References | () https://github.com/openclaw/openclaw/commit/d3ee5deb87ee2ad0ab83c92c365611165423cb71 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-h89v-j3x9-8wqj - Vendor Advisory, Patch | |
| References | () https://www.vulncheck.com/advisories/openclaw-denial-of-service-via-unguarded-archive-extraction-in-extractarchive - Third Party Advisory |
09 Mar 2026, 13:36
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
05 Mar 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
05 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-05 22:16
Updated : 2026-03-09 18:30
NVD link : CVE-2026-28452
Mitre link : CVE-2026-28452
CVE.ORG link : CVE-2026-28452
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-770
Allocation of Resources Without Limits or Throttling
