Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2w79-r9g8-wmcr | OpenClaw: Voice-call still parses large WebSocket frames before start validation (Incomplete fix for CVE-2026-32062) |
Thu, 30 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.31 contains an incomplete fix for CVE-2026-32062 where the voice-call component parses large WebSocket frames before start validation. Remote attackers can send oversized pre-start WebSocket frames to cause resource consumption and denial of service. | |
| Title | OpenClaw < 2026.3.31 - Resource Consumption via Oversized WebSocket Frames in voice-call | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-770 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-30T12:52:37.612Z
Reserved: 2026-04-20T14:15:22.223Z
Link: CVE-2026-41400
Updated: 2026-04-30T12:52:33.376Z
Status : Analyzed
Published: 2026-04-28T19:37:43.553
Modified: 2026-04-30T17:27:07.693
Link: CVE-2026-41400
No data.
OpenCVE Enrichment
Updated: 2026-04-28T23:15:43Z
Github GHSA