Impact
The vulnerability is in the Twilio webhook event deduplication logic of OpenClaw. Normalized event IDs are randomized for each parse, allowing attackers to replay webhook events that normally would be blocked by a deduplication manager. This can lead to duplicate or stale call-state transitions, potentially causing incorrect call handling and state corruption.
Affected Systems
OpenClaw OpenClaw versions earlier than 2026.2.23, which run on a Node.js environment as indicated by the CPE string. Systems using any of these versions are affected and must be identified.
Risk and Exploitability
The CVSS score of 6.9 indicates a medium severity vulnerability. No EPSS score is provided and it is not listed in the CISA KEV catalog, implying no confirmed widespread exploitation at this time. Attackers likely need remote network access to the Twilio webhook endpoint and can send repeated events to trigger the deduplication bypass, making the exploitation straightforward for anyone with legitimate Twilio integration credentials.
OpenCVE Enrichment
Github GHSA