CVE-2026-28452

5.5 MEDIUM

📋 TL;DR

OpenClaw versions before 2026.2.14 contain a denial of service vulnerability where attackers can send malicious ZIP or TAR archives during install/update operations, causing excessive CPU, memory, and disk resource consumption. This affects all OpenClaw users performing archive extraction operations, potentially leading to service degradation or system unavailability.

💻 Affected Systems

Products:
  • OpenClaw
Versions: All versions prior to 2026.2.14
Operating Systems: All platforms running OpenClaw
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable when archive extraction functionality is used, particularly during install or update operations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability due to resource exhaustion, requiring system reboot and service restoration.

🟠

Likely Case

Service degradation with slow performance, failed operations, and potential service interruptions.

🟢

If Mitigated

Minimal impact with proper input validation and resource limits in place.

🌐 Internet-Facing: MEDIUM - Requires archive upload capability, but many install/update operations may be internet-facing.
🏢 Internal Only: LOW - Internal systems with controlled archive sources are less vulnerable.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires providing malicious archives to the vulnerable function, which is straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2026.2.14 and later

Vendor Advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-h89v-j3x9-8wqj

Restart Required: Yes

Instructions:

1. Update OpenClaw to version 2026.2.14 or later. 2. Restart the OpenClaw service. 3. Verify the update was successful.

🔧 Temporary Workarounds

Implement archive size limits

all

Configure maximum archive size limits before extraction to prevent resource exhaustion.

# Configure in application settings or use system limits

Disable archive extraction from untrusted sources

all

Restrict archive extraction to trusted, verified sources only.

# Implement source validation in archive processing

🧯 If You Can't Patch

  • Implement strict input validation for archive files before processing
  • Monitor system resources and set up alerts for abnormal CPU/memory/disk usage

🔍 How to Verify

Check if Vulnerable:

Check OpenClaw version: if version is less than 2026.2.14, system is vulnerable.

Check Version:

openclaw --version or check package manager

Verify Fix Applied:

Verify OpenClaw version is 2026.2.14 or later and test archive extraction with known safe archives.

📡 Detection & Monitoring

Log Indicators:

  • High CPU/memory usage during archive extraction
  • Failed archive extraction operations
  • System resource exhaustion warnings

Network Indicators:

  • Large archive file uploads to OpenClaw endpoints
  • Multiple archive upload attempts

SIEM Query:

source="openclaw" AND ("extractArchive" OR "archive extraction") AND (cpu_usage>90 OR memory_usage>90)

🔗 References

📤 Share & Export