OpenClaw versions2026.2.21-2 prior to 2026.2.22 and @openclaw/voice-call versions 2026.2.21 prior to 2026.2.22 accept media-stream WebSocket upgrades before stream validation, allowing unauthenticated clients to establish connections. Remote attackers can hold idle pre-authenticated sockets open to consume connection resources and degrade service availability for legitimate streams.
References
| Link | Resource |
|---|---|
| https://github.com/openclaw/openclaw/commit/1d8968c8a821ff1a05c294a1846b3bcb6f343794 | Patch |
| https://github.com/openclaw/openclaw/security/advisories/GHSA-mfg5-7q5g-f37j | Mitigation Vendor Advisory |
| https://www.vulncheck.com/advisories/openclaw-unauthenticated-websocket-resource-exhaustion-via-media-stream | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-03-11 14:16
Updated : 2026-03-26 12:48
NVD link : CVE-2026-32062
Mitre link : CVE-2026-32062
CVE.ORG link : CVE-2026-32062
JSON object : View
Products Affected
openclaw
- openclaw
- openclaw\/voice-call
CWE
CWE-770
Allocation of Resources Without Limits or Throttling
