Cyber Posture

CVE-2026-26319

High

Published: 19 February 2026

Published
19 February 2026
Modified
20 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0005 14.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26319 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Openclaw Openclaw. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

This vulnerability is AI-related — categorised as Other AI Platforms.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-306

Requires established identification and authentication to unlock, mitigating missing authentication for continued system access.

addresses: CWE-306

Requiring identification and rationale for actions allowed without authentication ensures critical functions are not left unprotected by forcing review of authentication requirements.

addresses: CWE-306

Authorizing mobile device connections to organizational systems ensures authentication is performed for this critical access function.

addresses: CWE-306

Guarantees critical functions are protected by mandatory invocation of the access control mechanism.

addresses: CWE-306

Auditing sessions makes it possible to detect access to critical functions without required authentication.

addresses: CWE-306

The assessment process confirms authentication is present and effective for critical functions, preventing exploitation from missing authentication.

addresses: CWE-306

Certification assesses that critical functions have required authentication controls in place.

addresses: CWE-306

Disabling non-essential functions and services eliminates the need to secure them, reducing exposure from missing authentication on unnecessary components.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Auth bypass on publicly reachable webhook endpoint (fail-open signature verification) directly enables exploitation of a public-facing application to trigger unauthorized actions.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenClaw is a personal AI assistant. Versions 2026.2.13 and below allow the optional @openclaw/voice-call plugin Telnyx webhook handler to accept unsigned inbound webhook requests when telnyx.publicKey is not configured, enabling unauthenticated callers to forge Telnyx events. Telnyx webhooks are expected…

more

to be authenticated via Ed25519 signature verification. In affected versions, TelnyxProvider.verifyWebhook() could effectively fail open when no Telnyx public key was configured, allowing arbitrary HTTP POST requests to the voice-call webhook endpoint to be treated as legitimate Telnyx events. This only impacts deployments where the Voice Call plugin is installed, enabled, and the webhook endpoint is reachable from the attacker (for example, publicly exposed via a tunnel/proxy). The issue has been fixed in version 2026.2.14.

Deeper analysisAI

CVE-2026-26319 affects OpenClaw, a personal AI assistant, in versions 2026.2.13 and below. The vulnerability resides in the optional @openclaw/voice-call plugin's Telnyx webhook handler, which accepts unsigned inbound webhook requests when the telnyx.publicKey is not configured. This bypasses the expected Ed25519 signature verification for Telnyx webhooks, causing the TelnyxProvider.verifyWebhook() function to fail open. As a result, arbitrary HTTP POST requests to the voice-call webhook endpoint are processed as legitimate Telnyx events. The issue is classified under CWE-306 (Missing Authentication for Critical Function) with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).

Any unauthenticated attacker with network access to the voice-call webhook endpoint can exploit this vulnerability by sending forged HTTP POST requests mimicking Telnyx events. This requires the voice-call plugin to be installed and enabled, with the endpoint reachable, such as when publicly exposed via a tunnel or proxy. Successful exploitation allows attackers to impersonate Telnyx and trigger plugin actions as legitimate events, leading to high integrity impacts without affecting confidentiality or availability.

Mitigation is available in OpenClaw version 2026.2.14, which addresses the issue through fixes detailed in GitHub commits 29b587e73cbdc941caec573facd16e87d52f007b and f47584fec86d6d73f2d483043a2ad0e7e3c50411. The security advisory GHSA-4hg8-92x6-h2f3 and release notes for v2026.2.14 provide further details. Deployments should update to the patched version and ensure telnyx.publicKey is configured where applicable.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.2.14

AI Security AnalysisAI

AI Category
Other AI Platforms
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Matched keywords: ai

CVEs Like This One

CVE-2026-28472Same product: Openclaw Openclaw
CVE-2026-28450Same product: Openclaw Openclaw
CVE-2026-32041Same product: Openclaw Openclaw
CVE-2026-30741Same product: Openclaw Openclaw
CVE-2026-25474Same product: Openclaw Openclaw
CVE-2026-28458Same product: Openclaw Openclaw
CVE-2026-26316Same product: Openclaw Openclaw
CVE-2026-28465Same product: Openclaw Openclaw
CVE-2026-31998Same product: Openclaw Openclaw
CVE-2026-28468Same product: Openclaw Openclaw

References