Impact
OpenClaw before 2026.3.31 allows unauthorized group senders to trigger audio preflight transcription without proper allowlist enforcement, leading to high resource consumption and potential billing abuse. The weakness is classified as CWE-408, Improper Resource Allocation, because the system accepts legitimate preflight requests without checking sender authorization, causing unnecessary processing.
Affected Systems
The affected product is OpenClaw from OpenClaw. Versions older than 2026.3.31 are vulnerable, as identified by the vendor’s release notes.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity, and the EPSS score is not available, so exploitation likelihood cannot be precisely quantified. The vulnerability is not listed in the CISA KEV catalog. Attackers likely use a network-based approach by submitting audio preflight requests via Telegram to the affected endpoint before authorization checks are applied, which is inferred from the description.
OpenCVE Enrichment
Github GHSA