OpenClaw before 2026.3.28 contains a webhook replay vulnerability in Plivo V3 signature verification that canonicalizes query ordering for signatures but hashes raw URLs for replay detection. Attackers can reorder query parameters to bypass replay cache detection and trigger duplicate voice-call processing with a captured valid signed webhook.
Metrics
Affected Vendors & Products
References
History
Wed, 29 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.28 contains a webhook replay vulnerability in Plivo V3 signature verification that canonicalizes query ordering for signatures but hashes raw URLs for replay detection. Attackers can reorder query parameters to bypass replay cache detection and trigger duplicate voice-call processing with a captured valid signed webhook. | |
| Title | OpenClaw < 2026.3.28 - Webhook Replay via Query Parameter Reordering in Plivo V3 | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-325 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-04-28T18:09:54.896Z
Updated: 2026-04-29T13:27:00.547Z
Reserved: 2026-04-20T14:13:45.349Z
Link: CVE-2026-41395
Updated: 2026-04-29T13:26:48.281Z
Status : Analyzed
Published: 2026-04-28T19:37:42.880
Modified: 2026-04-30T20:45:25.643
Link: CVE-2026-41395
No data.