CVE-2026-26319
📋 TL;DR
OpenClaw versions 2026.2.13 and below with the @openclaw/voice-call plugin allow unauthenticated attackers to forge Telnyx webhook events when telnyx.publicKey is not configured. This affects deployments where the Voice Call plugin is installed, enabled, and the webhook endpoint is publicly accessible.
💻 Affected Systems
- OpenClaw with @openclaw/voice-call plugin
📦 What is this software?
Openclaw by Openclaw
⚠️ Risk & Real-World Impact
Worst Case
Attackers could inject malicious voice call events, potentially triggering unauthorized actions, data manipulation, or service disruption in the AI assistant.
Likely Case
Unauthenticated callers could spoof legitimate Telnyx events, leading to incorrect call handling, logging errors, or minor service anomalies.
If Mitigated
With proper authentication configured, only legitimate signed Telnyx events are processed, maintaining system integrity.
🎯 Exploit Status
Exploitation requires sending arbitrary HTTP POST requests to the vulnerable webhook endpoint without authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2026.2.14
Vendor Advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-4hg8-92x6-h2f3
Restart Required: Yes
Instructions:
1. Update OpenClaw to version 2026.2.14 or later. 2. Restart the OpenClaw service. 3. Verify the telnyx.publicKey is properly configured if using Telnyx webhooks.
🔧 Temporary Workarounds
Disable Voice Call Plugin
allTemporarily disable the @openclaw/voice-call plugin to prevent exploitation.
openclaw config set plugins.voice-call.enabled false
systemctl restart openclaw
Configure Telnyx Public Key
allProperly configure telnyx.publicKey to enforce Ed25519 signature verification.
openclaw config set telnyx.publicKey "YOUR_PUBLIC_KEY_HERE"
🧯 If You Can't Patch
- Restrict network access to the webhook endpoint using firewall rules or network segmentation.
- Implement a web application firewall (WAF) to filter unauthorized requests to the endpoint.
🔍 How to Verify
Check if Vulnerable:
Check if OpenClaw version is 2026.2.13 or below and the voice-call plugin is enabled without telnyx.publicKey configured.
Check Version:
openclaw --version
Verify Fix Applied:
Confirm OpenClaw version is 2026.2.14 or later and telnyx.publicKey is properly set if using Telnyx webhooks.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /webhook/voice-call endpoint without valid signatures
- Failed signature verification attempts or missing public key warnings
Network Indicators:
- Inbound HTTP POST traffic to the voice-call webhook endpoint from unexpected sources
SIEM Query:
source="openclaw.log" AND ("TelnyxProvider.verifyWebhook" OR "/webhook/voice-call") AND ("missing public key" OR "signature verification failed")
🔗 References
- https://github.com/openclaw/openclaw/commit/29b587e73cbdc941caec573facd16e87d52f007b
- https://github.com/openclaw/openclaw/commit/f47584fec86d6d73f2d483043a2ad0e7e3c50411
- https://github.com/openclaw/openclaw/releases/tag/v2026.2.14
- https://github.com/openclaw/openclaw/security/advisories/GHSA-4hg8-92x6-h2f3