CVE-2026-32049
Received Received - Intake
Buffer Overflow in OpenClaw Media Ingestion Causes Instability

Publication date: 2026-03-21

Last updated on: 2026-03-23

Assigner: VulnCheck

Description
OpenClaw versions prior to 2026.2.22 fail to consistently enforce configured inbound media byte limits before buffering remote media across multiple channel ingestion paths. Remote attackers can send oversized media payloads to trigger elevated memory usage and potential process instability.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-21
Last Modified
2026-03-23
Generated
2026-05-07
AI Q&A
2026-03-21
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.2.22 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-770 The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated.
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to update OpenClaw to version 2026.2.22 or later, where the vulnerability has been fixed by enforcing maximum inbound media byte limits during remote media fetch operations.

This update includes changes that:

  • Enforce a configurable maximum byte size limit on inbound media downloads across multiple messaging platforms.
  • Reject media payloads that exceed the configured size limit before buffering them, preventing memory spikes.

Until the update can be applied, consider limiting exposure by restricting network access to OpenClaw services or monitoring and blocking unusually large media payloads if possible.


Can you explain this vulnerability to me?

CVE-2026-32049 is a vulnerability in OpenClaw versions prior to 2026.2.22 where the software fails to consistently enforce configured inbound media byte limits before buffering remote media across multiple channel ingestion paths.

This means that remote attackers can send media payloads that are larger than the configured size limits, causing the system to accept oversized media.

As a result, this can lead to elevated memory usage and potential process instability, which could cause denial-of-service conditions.

The fix involves enforcing a maximum byte size limit on inbound media downloads, checking the size before processing, and rejecting payloads that exceed the limit.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing remote attackers to send oversized media payloads that bypass the configured byte limits.

Such oversized payloads can cause elevated memory consumption on the affected system.

This elevated memory usage can lead to process instability and potentially cause denial-of-service (DoS) conditions, making the system unavailable or unreliable.

The attack requires no privileges or user interaction and can be executed remotely over the network.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves monitoring for unusually large inbound media payloads being fetched or buffered by OpenClaw prior to version 2026.2.22. Since the vulnerability allows remote attackers to send oversized media payloads that cause elevated memory usage and potential process instability, signs include spikes in memory consumption or process crashes related to media ingestion.

Specific commands are not provided in the available resources. However, general detection approaches could include:

  • Monitoring OpenClaw process memory usage for spikes during media ingestion.
  • Checking OpenClaw logs for errors or warnings related to media downloads or process instability.
  • Using network monitoring tools to detect unusually large inbound media payloads targeting OpenClaw.

Since no explicit commands or detection scripts are mentioned in the resources, users should rely on monitoring system and application logs and resource usage patterns.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart