CVE-2026-29606
Severity CVSS v4.0:
MEDIUM
Type:
CWE-306
Missing Authentication for Critical Function
Publication date:
05/03/2026
Last modified:
11/03/2026
Description
OpenClaw versions prior to 2026.2.14 contain a webhook signature-verification bypass in the voice-call extension that allows unauthenticated requests when the tunnel.allowNgrokFreeTierLoopbackBypass option is explicitly enabled. An external attacker can send forged requests to the publicly reachable webhook endpoint without a valid X-Twilio-Signature header, resulting in unauthorized webhook event handling and potential request flooding attacks.
Impact
Base Score 4.0
6.30
Severity 4.0
MEDIUM
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | 2026.2.14 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



