CVE-2026-28461

| EUVD-2026-13014 HIGH
2026-03-19 VulnCheck
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

4
Patch Released
Apr 02, 2026 - 14:30 nvd
Patch available
EUVD ID Assigned
Mar 19, 2026 - 01:30 euvd
EUVD-2026-13014
Analysis Generated
Mar 19, 2026 - 01:30 vuln.today
CVE Published
Mar 19, 2026 - 01:00 nvd
HIGH 7.5

Description

OpenClaw versions prior to 2026.3.1 contain an unbounded memory growth vulnerability in the Zalo webhook endpoint that allows unauthenticated attackers to trigger in-memory key accumulation by varying query strings. Remote attackers can exploit this by sending repeated requests with different query parameters to cause memory pressure, process instability, or out-of-memory conditions that degrade service availability.

Analysis

OpenClaw contains an unbounded memory growth vulnerability in its Zalo webhook endpoint that allows unauthenticated remote attackers to exhaust system memory through query string manipulation. OpenClaw versions prior to 2026.3.1 are affected. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Inventory all OpenClaw instances and confirm version numbers; disable or restrict access to the Zalo webhook endpoint if not actively used. Within 7 days: Implement Web Application Firewall (WAF) rules to rate-limit and validate webhook requests; enable query parameter filtering. …

Sign in for detailed remediation steps.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +38
POC: 0

Share

CVE-2026-28461 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy