OpenClaw before 2026.3.31 contains a callback origin mutation vulnerability in Plivo voice-call replay that allows attackers to mutate in-process callback origin before replay rejection. Attackers with captured valid callbacks for live calls can exploit this to manipulate callback origins during the replay process.
References
Configurations
History
28 Apr 2026, 18:55
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Openclaw openclaw
Openclaw |
|
| References | () https://github.com/openclaw/openclaw/commit/efe9183f9d2fd5e01c8068fa01f4a07a58a63c0b - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-89r3-6x4j-v7wf - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-callback-origin-mutation-in-plivo-voice-call-replay - Third Party Advisory | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* |
23 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-23 22:16
Updated : 2026-04-28 18:55
NVD link : CVE-2026-41337
Mitre link : CVE-2026-41337
CVE.ORG link : CVE-2026-41337
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
