OpenClaw's Open Door: The 'Convenience' Flag That Bypassed Auth
Vulnerability ID: GHSA-C37P-4QQG-3P76
CVSS Score: 5.8
Published: 2026-02-18
In the world of programmable voice, verifying webhooks is critical—unless you're using OpenClaw's 'ngrok compatibility' mode. A vulnerability in the openclaw npm package allowed attackers to completely bypass Twilio signature verification by exploiting a developer convenience flag designed for local testing. By effectively telling the server 'it's okay, I'm using ngrok,' the application would skip cryptographic checks entirely, allowing unauthenticated actors to forge incoming voice calls and manipulate call flows.
TL;DR
OpenClaw introduced a configuration flag to help developers test Twilio webhooks over ngrok. Instead of fixing header validation, the flag implemented a hardcoded return true bypass for signature checks. This allows attackers to forge webhooks and trigger unauthorized voice events on affected instances.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-347
- Attack Vector: Network
- CVSS Score: 5.8 (Medium)
- Impact: Integrity Loss (Auth Bypass)
- Exploit Status: PoC Available
- Affected Component: webhook-security.ts
Affected Systems
- openclaw npm package
- OpenClaw Voice Call Extension
-
openclaw: <= 2026.2.13 (Fixed in:
2026.2.14)
Code Analysis
Commit: ff11d87
fix(voice-call): remove insecure signature bypass for ngrok compatibility
- if (isNgrokFreeTier && options?.allowNgrokFreeTierLoopbackBypass && isLoopback) { return { ok: true } }
+ // Logic changed to use headers for reconstruction instead of bypass
Exploit Details
- Internal: Proof of concept involving manual POST requests to ngrok-tunneled instances.
Mitigation Strategies
- Disable
tunnel.allowNgrokFreeTierLoopbackBypassin all environments unless actively debugging signature issues. - Ensure webhook endpoints are not reachable by the public internet during development unless protected by authentication.
- Audit environment variables for insecure boolean flags.
Remediation Steps:
- Upgrade
openclawto version2026.2.14immediately. - Check
config.tsor.envfiles forallowNgrokFreeTierLoopbackBypassand set it tofalse. - Restart the OpenClaw service.
References
Read the full report for GHSA-C37P-4QQG-3P76 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)