OpenClaw versions prior to 2026.2.14 contain a webhook signature-verification bypass in the voice-call extension that allows unauthenticated requests when the tunnel.allowNgrokFreeTierLoopbackBypass option is explicitly enabled. An external attacker can send forged requests to the publicly reachable webhook endpoint without a valid X-Twilio-Signature header, resulting in unauthorized webhook event handling and potential request flooding attacks.
References
Configurations
History
No history.
Information
Published : 2026-03-05 22:16
Updated : 2026-03-11 01:10
NVD link : CVE-2026-29606
Mitre link : CVE-2026-29606
CVE.ORG link : CVE-2026-29606
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-306
Missing Authentication for Critical Function
