OpenClaw: Gateway WebSocket Denial of Service via unbounded pre-auth upgrades
Moderate severity
GitHub Reviewed
Published
Mar 29, 2026
in
openclaw/openclaw
•
Updated Mar 31, 2026
Description
Published to the GitHub Advisory Database
Mar 31, 2026
Reviewed
Mar 31, 2026
Last updated
Mar 31, 2026
Summary
The gateway accepted unbounded concurrent unauthenticated WebSocket upgrades before allocating them to an authenticated session budget.
Impact
An unauthenticated network attacker could consume socket and worker capacity and disrupt WebSocket availability for legitimate clients.
Affected Component
src/gateway/server-http.ts, src/gateway/server/preauth-connection-budget.tsFixed Versions
<= 2026.3.24>= 2026.3.282026.3.28contains the fix.Fix
Fixed by commit
cb5f7e201f(gateway: cap concurrent pre-auth websocket upgrades).Discovered by:Topsec AlphaLab (wang dong)
References