OpenClaw versions prior to 2026.3.1 contain an unbounded memory growth vulnerability in the Zalo webhook endpoint that allows unauthenticated attackers to trigger in-memory key accumulation by varying query strings. Remote attackers can exploit this by sending repeated requests with different query parameters to cause memory pressure, process instability, or out-of-memory conditions that degrade service availability.
References
| Link | Resource |
|---|---|
| https://github.com/openclaw/openclaw/security/advisories/GHSA-wr6m-jg37-68xh | Mitigation Vendor Advisory |
| https://www.vulncheck.com/advisories/openclaw-unbounded-memory-growth-in-zalo-webhook-via-query-string-key-churn | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-19 02:16
Updated : 2026-03-19 19:18
NVD link : CVE-2026-28461
Mitre link : CVE-2026-28461
CVE.ORG link : CVE-2026-28461
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-770
Allocation of Resources Without Limits or Throttling
