Impact
OpenClaw versions earlier than 2026.2.25 lack a durable replay state for Nextcloud Talk webhook events, allowing an attacker to capture a valid signed webhook payload and replay it without suppression. This results in duplicate inbound message processing, which can corrupt data integrity or disrupt availability of the messaging service. The weakness is identified as CWE-294, Improper Handling of Reset or Replay Conditions.
Affected Systems
All OpenClaw installations running any version before 2026.2.25 are affected. The vulnerability applies to the OpenClaw:OpenClaw product as represented by the CPE string cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*.
Risk and Exploitability
The CVSS score of 6.3 indicates moderate severity. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector involves an adversary able to intercept or otherwise obtain a previously valid signed webhook request and replay it at a later time. No additional privileges are required beyond the ability to capture the request, making exploitation straightforward and potentially harmful for systems that rely on webhook integrity.
OpenCVE Enrichment
Github GHSA