OpenClaw versions prior to 2026.2.23 contain a vulnerability in Twilio webhook event deduplication where normalized event IDs are randomized per parse, allowing replay events to bypass manager dedupe checks. Attackers can replay Twilio webhook events to trigger duplicate or stale call-state transitions, potentially causing incorrect call handling and state corruption.
References
| Link | Resource |
|---|---|
| https://github.com/openclaw/openclaw/commit/1d28da55a5d0ff409e34999e0961157e9db0a2ab | Patch |
| https://github.com/openclaw/openclaw/security/advisories/GHSA-vqx8-9xxw-f2m7 | Mitigation Vendor Advisory |
| https://www.vulncheck.com/advisories/openclaw-twilio-webhook-replay-bypass-via-randomized-event-id-normalization | Third Party Advisory |
Configurations
History
24 Mar 2026, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
|
| References | () https://github.com/openclaw/openclaw/commit/1d28da55a5d0ff409e34999e0961157e9db0a2ab - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-vqx8-9xxw-f2m7 - Mitigation, Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-twilio-webhook-replay-bypass-via-randomized-event-id-normalization - Third Party Advisory |
21 Mar 2026, 01:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-21 01:17
Updated : 2026-03-24 21:15
NVD link : CVE-2026-32053
Mitre link : CVE-2026-32053
CVE.ORG link : CVE-2026-32053
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-294
Authentication Bypass by Capture-replay
