Impact
OpenClaw versions prior to 2026.3.31 contain an authorization bypass that lets attackers ignore channel and member allowlists by exploiting stale role validation and inadequate channel name checks. This enables an attacker to join restricted voice channels, as stated in the CVE. No explicit mention of audio data interception, injection, or manipulation is provided in the CVE. Based on the nature of voice channel access, it is inferred that unauthorized participation could lead to eavesdropping, but this is not explicitly detailed.
Affected Systems
All deployments of OpenClaw before the 2026.3.31 release, including any installations that have not applied the latest 2026.3.31 patch, are potentially vulnerable. The issue affects the Discord voice ingestion component used by OpenClaw to receive incoming voice streams.
Risk and Exploitability
The CVSS score of 2.3 places this vulnerability in the low severity range, and there is no EPSS score available, suggesting no known widespread exploitation. It is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker would need to access a Discord integration and craft a voice stream that triggers the vulnerable ingestion endpoint, as the logic involves channel‑and‑role validation. The vulnerability appears remotely exploitable and does not require local privileges.
OpenCVE Enrichment