Improper Handling of Highly Compressed Data (Data Amplification) Affecting openclaw package, versions <2026.3.13.1-r0


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-MINIMOSLATEST-OPENCLAW-15674778
  • published18 Mar 2026
  • disclosed16 Mar 2026

Introduced: 16 Mar 2026

NewCVE-2026-32630  (opens in a new tab)
CWE-409  (opens in a new tab)

How to fix?

Upgrade Minimos:latest openclaw to version 2026.3.13.1-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream openclaw package and not the openclaw package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

file-type detects the file type of a file, stream, or data. From 20.0.0 to 21.3.1, a crafted ZIP file can trigger excessive memory growth during type detection in file-type when using fileTypeFromBuffer(), fileTypeFromBlob(), or fileTypeFromFile(). The ZIP inflate output limit is enforced for stream-based detection, but not for known-size inputs. As a result, a small compressed ZIP can cause file-type to inflate and process a much larger payload while probing ZIP-based formats such as OOXML. This vulnerability is fixed in 21.3.2.

CVSS Base Scores

version 3.1