CVE-2026-32053

OpenClaw versions prior to 2026.2.23 contain a vulnerability in Twilio webhook event deduplication where normalized event IDs are randomized per parse, allowing replay events to bypass manager dedupe checks. Attackers can replay Twilio webhook events to trigger duplicate or stale call-state transitions, potentially causing incorrect call handling and state corruption.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

24 Mar 2026, 21:15

Type Values Removed Values Added
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw openclaw
Openclaw
References () https://github.com/openclaw/openclaw/commit/1d28da55a5d0ff409e34999e0961157e9db0a2ab - () https://github.com/openclaw/openclaw/commit/1d28da55a5d0ff409e34999e0961157e9db0a2ab - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-vqx8-9xxw-f2m7 - () https://github.com/openclaw/openclaw/security/advisories/GHSA-vqx8-9xxw-f2m7 - Mitigation, Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-twilio-webhook-replay-bypass-via-randomized-event-id-normalization - () https://www.vulncheck.com/advisories/openclaw-twilio-webhook-replay-bypass-via-randomized-event-id-normalization - Third Party Advisory

21 Mar 2026, 01:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-21 01:17

Updated : 2026-03-24 21:15


NVD link : CVE-2026-32053

Mitre link : CVE-2026-32053

CVE.ORG link : CVE-2026-32053


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-294

Authentication Bypass by Capture-replay