Home

Description

OpenClaw before 2026.3.31 contains a resource consumption vulnerability in Telegram audio preflight transcription that allows unauthorized group senders to trigger transcription processing. Attackers can exploit insufficient allowlist enforcement to cause resource or billing consumption by initiating audio preflight operations before authorization checks are applied.

PUBLISHED Reserved 2026-04-20 | Published 2026-04-20 | Updated 2026-04-21 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Problem types

CWE-408: Incorrect Behavior Order: Early Amplification

Product status

Default status
unaffected

Any version before 2026.3.31
affected

2026.3.31 (semver)
unaffected

Credits

AntAISecurityLab reporter

References

github.com/...enclaw/security/advisories/GHSA-m6fx-m8hc-572m (GitHub Security Advisory (GHSA-m6fx-m8hc-572m)) vendor-advisory

github.com/...ommit/c4fa8635d03943ffe9e294d501089521dca635c5 (Patch Commit) patch

www.vulncheck.com/...-telegram-audio-preflight-transcription (VulnCheck Advisory: OpenClaw < 2026.3.31 - Resource Consumption via Unauthorized Telegram Audio Preflight Transcription) third-party-advisory

cve.org (CVE-2026-41331)

nvd.nist.gov (CVE-2026-41331)

Download JSON