<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-42437 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-42437/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 12:16:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-42437/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Denial-of-Service via Oversized WebSocket Frames</title><link>https://feed.craftedsignal.io/briefs/2026-05-openclaw-dos/</link><pubDate>Tue, 05 May 2026 12:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-openclaw-dos/</guid><description>OpenClaw versions prior to 2026.4.10 are vulnerable to a denial-of-service attack where remote attackers can send oversized WebSocket frames to the voice-call realtime path, causing service unavailability.</description><content:encoded><![CDATA[<p>OpenClaw versions 2026.4.9 and earlier are vulnerable to a denial-of-service (DoS) attack due to improper validation of WebSocket frame sizes on the voice-call realtime path. This vulnerability, identified as CVE-2026-42437, allows remote attackers to send oversized WebSocket frames, leading to resource exhaustion and service unavailability. Deployments exposing the vulnerable webhook path are at risk. Upgrading to version 2026.4.10 or later resolves this vulnerability. The issue was reported and patched in April 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an OpenClaw deployment exposing the voice-call realtime WebSocket path.</li>
<li>Attacker crafts a WebSocket frame exceeding the expected size limits.</li>
<li>Attacker sends the oversized WebSocket frame to the vulnerable endpoint.</li>
<li>The OpenClaw server receives the oversized frame without proper size validation.</li>
<li>The server attempts to process the oversized frame, consuming excessive resources.</li>
<li>Repeated sending of oversized frames leads to resource exhaustion on the server.</li>
<li>The OpenClaw service becomes unresponsive due to resource starvation.</li>
<li>Legitimate users are unable to access voice-call functionalities, resulting in a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in a denial-of-service condition, rendering the OpenClaw voice-call service unavailable. The impact is service disruption. The number of affected deployments is currently unknown, but all OpenClaw instances running versions prior to 2026.4.10 are susceptible if the vulnerable websocket endpoint is exposed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.10 or later to remediate CVE-2026-42437.</li>
<li>Monitor network traffic for unusually large WebSocket frames destined for the voice-call realtime path using a network intrusion detection system.</li>
<li>Implement rate limiting on WebSocket connections to mitigate the impact of potential DoS attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>websocket</category><category>cve-2026-42437</category></item></channel></rss>