CVE-2026-26319

7.5 HIGH

📋 TL;DR

OpenClaw versions 2026.2.13 and below with the @openclaw/voice-call plugin allow unauthenticated attackers to forge Telnyx webhook events when telnyx.publicKey is not configured. This affects deployments where the Voice Call plugin is installed, enabled, and the webhook endpoint is publicly accessible.

💻 Affected Systems

Products:
  • OpenClaw with @openclaw/voice-call plugin
Versions: 2026.2.13 and below
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only impacts deployments with the Voice Call plugin installed, enabled, and webhook endpoint reachable from attackers (e.g., publicly exposed).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject malicious voice call events, potentially triggering unauthorized actions, data manipulation, or service disruption in the AI assistant.

🟠

Likely Case

Unauthenticated callers could spoof legitimate Telnyx events, leading to incorrect call handling, logging errors, or minor service anomalies.

🟢

If Mitigated

With proper authentication configured, only legitimate signed Telnyx events are processed, maintaining system integrity.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending arbitrary HTTP POST requests to the vulnerable webhook endpoint without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2026.2.14

Vendor Advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-4hg8-92x6-h2f3

Restart Required: Yes

Instructions:

1. Update OpenClaw to version 2026.2.14 or later. 2. Restart the OpenClaw service. 3. Verify the telnyx.publicKey is properly configured if using Telnyx webhooks.

🔧 Temporary Workarounds

Disable Voice Call Plugin

all

Temporarily disable the @openclaw/voice-call plugin to prevent exploitation.

openclaw config set plugins.voice-call.enabled false
systemctl restart openclaw

Configure Telnyx Public Key

all

Properly configure telnyx.publicKey to enforce Ed25519 signature verification.

openclaw config set telnyx.publicKey "YOUR_PUBLIC_KEY_HERE"

🧯 If You Can't Patch

  • Restrict network access to the webhook endpoint using firewall rules or network segmentation.
  • Implement a web application firewall (WAF) to filter unauthorized requests to the endpoint.

🔍 How to Verify

Check if Vulnerable:

Check if OpenClaw version is 2026.2.13 or below and the voice-call plugin is enabled without telnyx.publicKey configured.

Check Version:

openclaw --version

Verify Fix Applied:

Confirm OpenClaw version is 2026.2.14 or later and telnyx.publicKey is properly set if using Telnyx webhooks.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /webhook/voice-call endpoint without valid signatures
  • Failed signature verification attempts or missing public key warnings

Network Indicators:

  • Inbound HTTP POST traffic to the voice-call webhook endpoint from unexpected sources

SIEM Query:

source="openclaw.log" AND ("TelnyxProvider.verifyWebhook" OR "/webhook/voice-call") AND ("missing public key" OR "signature verification failed")

🔗 References

📤 Share & Export