CVE-2026-29612

5.5 MEDIUM

📋 TL;DR

OpenClaw versions before 2026.2.14 have a memory allocation vulnerability where base64-encoded media files are fully decoded before size limits are enforced. Attackers can send specially crafted large base64 payloads to cause excessive memory consumption, leading to denial of service. This affects all systems running vulnerable OpenClaw versions that process base64 media inputs.

💻 Affected Systems

Products:
  • OpenClaw
Versions: All versions prior to 2026.2.14
Operating Systems: All platforms running OpenClaw
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems that process base64-encoded media inputs through OpenClaw.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service unavailability due to memory exhaustion, potentially causing system crashes or requiring restarts.

🟠

Likely Case

Degraded performance, service instability, and temporary denial of service affecting application availability.

🟢

If Mitigated

Minimal impact with proper memory limits and monitoring in place; potential performance degradation but no service disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending large base64 payloads to vulnerable endpoints; no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2026.2.14

Vendor Advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-w2cg-vxx6-5xjg

Restart Required: Yes

Instructions:

1. Update OpenClaw to version 2026.2.14 or later. 2. Restart the OpenClaw service. 3. Verify the update was successful.

🔧 Temporary Workarounds

Implement input size validation

all

Add size validation for base64 inputs before decoding to limit memory allocation.

Configure application to reject base64 payloads exceeding reasonable size limits before decoding.

Rate limiting

all

Implement rate limiting on endpoints accepting base64 media inputs.

Configure rate limiting rules for media processing endpoints.

🧯 If You Can't Patch

  • Implement strict input validation to reject oversized base64 payloads before processing.
  • Deploy memory monitoring and alerting to detect abnormal memory consumption patterns.

🔍 How to Verify

Check if Vulnerable:

Check OpenClaw version; if version is earlier than 2026.2.14, system is vulnerable.

Check Version:

openclaw --version

Verify Fix Applied:

Verify OpenClaw version is 2026.2.14 or later and test with controlled base64 payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusually large base64 payloads in request logs
  • Memory allocation errors or warnings
  • Service restart events

Network Indicators:

  • Large base64 payloads in HTTP POST/PUT requests to media endpoints
  • Spike in memory usage correlated with specific requests

SIEM Query:

source="openclaw.log" AND (message="*memory allocation*" OR message="*base64*" AND size>1000000)

🔗 References

📤 Share & Export