Denial of Service Vulnerability in OpenClaw WebSocket Upgrades
CVE-2026-41399

8.7HIGH

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
28 April 2026

What is CVE-2026-41399?

OpenClaw versions prior to 2026.3.28 are susceptible to a vulnerability that allows unauthenticated attackers to perform unbounded concurrent WebSocket upgrades. This flaw can lead to exhaustion of socket and worker capacities, causing disruption to WebSocket availability for legitimate users. Attackers can exploit this weakness to overload the system and prevent genuine clients from establishing a connection. Addressing this issue is crucial for maintaining service availability and protecting against potential disruptions.

Affected Version(s)

OpenClaw 0 < 2026.3.28

OpenClaw 2026.3.28

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

wang dong (@topsec-bunney)
.