| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3m3q-x3gj-f79x | OpenClaw optional voice-call plugin: webhook verification may be bypassed behind certain proxy configurations |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 06 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openclaw
Openclaw voice-call |
|
| Vendors & Products |
Openclaw
Openclaw voice-call |
Thu, 05 Mar 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw's voice-call plugin versions before 2026.2.3 contain an improper authentication vulnerability in webhook verification that allows remote attackers to bypass verification by supplying untrusted forwarded headers. Attackers can spoof webhook events by manipulating Forwarded or X-Forwarded-* headers in reverse-proxy configurations that implicitly trust these headers. | |
| Title | OpenClaw voice-call < 2026.2.3 - Webhook Verification Bypass via Forwarded Headers | |
| Weaknesses | CWE-345 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-06T16:34:49.333Z
Reserved: 2026-02-27T19:18:43.159Z
Link: CVE-2026-28465
No data.
Status : Received
Published: 2026-03-05T22:16:19.593
Modified: 2026-03-06T17:16:30.580
Link: CVE-2026-28465
No data.
OpenCVE Enrichment
Updated: 2026-03-06T15:00:06Z
Github GHSA