OpenClaw versions prior to 2026.2.23 contain a vulnerability in Twilio webhook event deduplication where normalized event IDs are randomized per parse, allowing replay events to bypass manager dedupe checks. Attackers can replay Twilio webhook events to trigger duplicate or stale call-state transitions, potentially causing incorrect call handling and state corruption.
References
| Link | Resource |
|---|---|
| https://github.com/openclaw/openclaw/commit/1d28da55a5d0ff409e34999e0961157e9db0a2ab | Patch |
| https://github.com/openclaw/openclaw/security/advisories/GHSA-vqx8-9xxw-f2m7 | Mitigation Vendor Advisory |
| https://www.vulncheck.com/advisories/openclaw-twilio-webhook-replay-bypass-via-randomized-event-id-normalization | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-21 01:17
Updated : 2026-03-24 21:15
NVD link : CVE-2026-32053
Mitre link : CVE-2026-32053
CVE.ORG link : CVE-2026-32053
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-294
Authentication Bypass by Capture-replay
