OpenClaw did not consistently enforce configured inbound media byte limits before buffering remote media in several channel ingestion paths. A remote sender could trigger oversized downloads and memory pressure before rejection.
openclaw (npm)<= 2026.2.21-2 (latest published at triage time)2026.2.22 (planned next release)An attacker could cause elevated memory usage and potential process instability (denial of service) by sending oversized media payloads.
73d93dee64127a26f1acd09d0403b794cdeb4f5cpatched_versions is pre-set to the planned next release (2026.2.22). After that npm release is published, this advisory can be published without further version-field edits.
OpenClaw thanks @tdjackey for reporting.
{
"nvd_published_at": null,
"severity": "HIGH",
"github_reviewed": true,
"cwe_ids": [
"CWE-400",
"CWE-770"
],
"github_reviewed_at": "2026-03-02T22:32:55Z"
}