{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T17:42:42.889","vulnerabilities":[{"cve":{"id":"CVE-2026-26319","sourceIdentifier":"security-advisories@github.com","published":"2026-02-19T23:16:24.857","lastModified":"2026-02-20T19:03:02.103","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"OpenClaw is a personal AI assistant. Versions 2026.2.13 and below allow the optional @openclaw/voice-call plugin Telnyx webhook handler to accept unsigned inbound webhook requests when telnyx.publicKey is not configured, enabling unauthenticated callers to forge Telnyx events. Telnyx webhooks are expected to be authenticated via Ed25519 signature verification. In affected versions, TelnyxProvider.verifyWebhook() could effectively fail open when no Telnyx public key was configured, allowing arbitrary HTTP POST requests to the voice-call webhook endpoint to be treated as legitimate Telnyx events. This only impacts deployments where the Voice Call plugin is installed, enabled, and the webhook endpoint is reachable from the attacker (for example, publicly exposed via a tunnel/proxy). The issue has been fixed in version 2026.2.14."},{"lang":"es","value":"OpenClaw es un asistente personal de IA. Las versiones 2026.2.13 e inferiores permiten que el plugin opcional @openclaw/voice-call, gestor de webhooks de Telnyx, acepte solicitudes de webhook entrantes sin firmar cuando telnyx.publicKey no está configurado, lo que permite a los llamantes no autenticados falsificar eventos de Telnyx. Se espera que los webhooks de Telnyx sean autenticados mediante verificación de firma Ed25519. En las versiones afectadas, TelnyxProvider.verifyWebhook() podría fallar de forma abierta (fail open) cuando no se configuró ninguna clave pública de Telnyx, permitiendo que solicitudes HTTP POST arbitrarias al endpoint del webhook de voice-call sean tratadas como eventos legítimos de Telnyx. Esto solo afecta a las implementaciones donde el plugin de Voice Call está instalado, habilitado y el endpoint del webhook es accesible desde el atacante (por ejemplo, expuesto públicamente a través de un túnel/proxy). El problema ha sido solucionado en la versión 2026.2.14."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-306"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*","versionEndExcluding":"2026.2.14","matchCriteriaId":"0F3079A3-9FBD-4E87-821D-5CAF0622C555"}]}]}],"references":[{"url":"https://github.com/openclaw/openclaw/commit/29b587e73cbdc941caec573facd16e87d52f007b","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/openclaw/openclaw/commit/f47584fec86d6d73f2d483043a2ad0e7e3c50411","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/openclaw/openclaw/releases/tag/v2026.2.14","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/openclaw/openclaw/security/advisories/GHSA-4hg8-92x6-h2f3","source":"security-advisories@github.com","tags":["Mitigation","Vendor Advisory"]}]}}]}