OpenClaw's voice-call plugin versions before 2026.2.3 contain an improper authentication vulnerability in webhook verification that allows remote attackers to bypass verification by supplying untrusted forwarded headers. Attackers can spoof webhook events by manipulating Forwarded or X-Forwarded-* headers in reverse-proxy configurations that implicitly trust these headers.
Metrics
Affected Vendors & Products
References
History
Thu, 05 Mar 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw's voice-call plugin versions before 2026.2.3 contain an improper authentication vulnerability in webhook verification that allows remote attackers to bypass verification by supplying untrusted forwarded headers. Attackers can spoof webhook events by manipulating Forwarded or X-Forwarded-* headers in reverse-proxy configurations that implicitly trust these headers. | |
| Title | OpenClaw voice-call < 2026.2.3 - Webhook Verification Bypass via Forwarded Headers | |
| Weaknesses | CWE-345 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T22:28:05.222Z
Reserved: 2026-02-27T19:18:43.159Z
Link: CVE-2026-28465
No data.
Status : Received
Published: 2026-03-05T22:16:19.593
Modified: 2026-03-05T22:16:19.593
Link: CVE-2026-28465
No data.
OpenCVE Enrichment
No data.