CVE-2026-41399

OpenClaw before 2026.3.28 accepts unbounded concurrent unauthenticated WebSocket upgrades without pre-authentication budget allocation. Unauthenticated network attackers can exhaust socket and worker capacity to disrupt WebSocket availability for legitimate clients.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

30 Apr 2026, 16:57

Type Values Removed Values Added
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-f44p-c7w9-7xr7 - () https://github.com/openclaw/openclaw/security/advisories/GHSA-f44p-c7w9-7xr7 - Vendor Advisory, Patch
References () https://www.vulncheck.com/advisories/openclaw-denial-of-service-via-unbounded-pre-auth-websocket-upgrades - () https://www.vulncheck.com/advisories/openclaw-denial-of-service-via-unbounded-pre-auth-websocket-upgrades - Third Party Advisory
First Time Openclaw openclaw
Openclaw

28 Apr 2026, 19:37

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-28 19:37

Updated : 2026-04-30 16:57


NVD link : CVE-2026-41399

Mitre link : CVE-2026-41399

CVE.ORG link : CVE-2026-41399


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-770

Allocation of Resources Without Limits or Throttling