CVE-2026-32062
Received Received - Intake
Unauthenticated WebSocket Upgrade Allows DoS in OpenClaw

Publication date: 2026-03-11

Last updated on: 2026-03-26

Assigner: VulnCheck

Description
OpenClaw versions2026.2.21-2 prior to 2026.2.22 and @openclaw/voice-call versions 2026.2.21 prior to 2026.2.22 accept media-stream WebSocket upgrades before stream validation, allowing unauthenticated clients to establish connections. Remote attackers can hold idle pre-authenticated sockets open to consume connection resources and degrade service availability for legitimate streams.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-11
Last Modified
2026-03-26
Generated
2026-05-07
AI Q&A
2026-03-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
openclaw openclaw to 2026.2.22 (exc)
openclaw openclaw/voice-call to 2026.2.22 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-770 The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-32062 is a vulnerability in OpenClaw and its @openclaw/voice-call package where media-stream WebSocket connections are accepted before validating the media stream. This means unauthenticated clients can establish connections without proper verification.'}, {'type': 'paragraph', 'content': "Specifically, the system accepts WebSocket upgrades before receiving a valid 'start' frame that triggers stream validation, allowing remote attackers to hold idle, pre-authenticated sockets open."}, {'type': 'paragraph', 'content': 'This flaw enables attackers to consume connection resources by maintaining many idle connections, potentially leading to denial of service by degrading availability for legitimate users.'}] [1, 2]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing remote attackers to consume server resources through unauthenticated, idle WebSocket connections.

By holding many pre-authenticated sockets open, attackers can exhaust connection resources, leading to degraded service availability or denial of service for legitimate users.

In environments where the media-stream endpoint is reachable and streaming is enabled, this can cause significant service disruption and reduced quality of service.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves unauthenticated clients establishing media-stream WebSocket connections before stream validation, allowing idle pre-authenticated sockets to consume resources.

To detect this on your network or system, monitor WebSocket connections to the media-stream endpoint for unusually high numbers of idle or pre-start connections that do not send a valid start frame within a short time.

Commands or approaches to detect this may include:

  • Using network monitoring tools (e.g., tcpdump, Wireshark) to capture WebSocket upgrade requests and identify many open connections without subsequent start frames.
  • Checking server logs for WebSocket connections that remain open beyond the expected pre-start timeout (default 5000 ms) without authentication or stream start.
  • Using commands like `netstat` or `ss` to count the number of open WebSocket connections to the media-stream port and identify if the number exceeds normal thresholds.
  • Implementing or reviewing application-level metrics or logs that track pending WebSocket connections and their states (pre-start vs active).

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation is to upgrade OpenClaw and @openclaw/voice-call packages to version 2026.2.22 or later, which includes the fix for this vulnerability.

The fix implements several controls to prevent resource exhaustion from unauthenticated WebSocket connections:

  • Enforce a pre-start timeout (default 5000 ms) to close WebSocket connections that do not send a valid start frame promptly.
  • Limit the total number of unauthenticated pending connections globally (default 32).
  • Limit the number of unauthenticated pending connections per IP address (default 4).
  • Set a hard cap on total open media-stream WebSocket connections (default 128).

Additionally, operators can tune these parameters in the voice-call plugin configuration schema as needed.

Until the upgrade is applied, consider monitoring and limiting WebSocket connections at the network or application level to reduce the risk of denial of service.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart