CVE-2026-32053

OpenClaw versions prior to 2026.2.23 contain a vulnerability in Twilio webhook event deduplication where normalized event IDs are randomized per parse, allowing replay events to bypass manager dedupe checks. Attackers can replay Twilio webhook events to trigger duplicate or stale call-state transitions, potentially causing incorrect call handling and state corruption.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

No history.

Information

Published : 2026-03-21 01:17

Updated : 2026-03-24 21:15


NVD link : CVE-2026-32053

Mitre link : CVE-2026-32053

CVE.ORG link : CVE-2026-32053


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-294

Authentication Bypass by Capture-replay