OpenClaw before 2026.3.31 contains a resource exhaustion vulnerability in media downloads that bypasses core safety limits for file size, count, and cleanup operations. Attackers can exhaust disk space by downloading media files without triggering intended safety restrictions, causing availability impact.
References
Configurations
History
30 Apr 2026, 19:38
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/openclaw/openclaw/commit/2194587d70d2aef863508b945319c5a7c88b12ce - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-4g5x-2jfc-xm98 - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-disk-exhaustion-via-media-download-bypass - Third Party Advisory | |
| First Time |
Openclaw openclaw
Openclaw |
28 Apr 2026, 19:37
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-28 19:37
Updated : 2026-04-30 19:38
NVD link : CVE-2026-41408
Mitre link : CVE-2026-41408
CVE.ORG link : CVE-2026-41408
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-770
Allocation of Resources Without Limits or Throttling
