CVE-2026-32062
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows attackers to connect to a service without needing to log in, which can let them keep connections open and use up resources, making it harder for legitimate users to access the service. It affects specific versions of OpenClaw and requires the attacker to exploit the system before it can properly check if they are allowed to connect.
Technical Description
OpenClaw versions2026.2.21-2 prior to 2026.2.22 and @openclaw/voice-call versions 2026.2.21 prior to 2026.2.22 accept media-stream WebSocket upgrades before stream validation, allowing unauthenticated clients to establish connections. Remote attackers can hold idle pre-authenticated sockets open to consume connection resources and degrade service availability for legitimate streams.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 11, 2026
27 days ago
Last Modified
Mar 12, 2026
26 days ago