Impact
The flaw in OpenClaw’s Plivo voice‑call replay allows an attacker who has captured a legitimate callback to alter the in‑process callback origin before the replay is rejected. This mutation can let the attacker spoof the origin of a callback, potentially interfering with authentication, routing, or other logic that relies on the callback source. The vulnerability is a form of Weakness in Authentication (CWE‑367) and can provide a degree of identity spoofing or unauthorized control over the acting voice call.
Affected Systems
OpenClaw platform, openclaw application, versions earlier than 2026.3.31. Users running any pre‑2026.3.31 release of OpenClaw on Node.js environments are affected.
Risk and Exploitability
The vulnerability carries a CVSS score of 6.3, indicating moderate severity. The EPSS score of less than 1% suggests a low likelihood of public exploitation at present. It is not listed in the CISA KEV catalog. Attackers would need to have access to a valid callback from an ongoing live call and then replay that callback, modifying its origin. This requires prior capture of a legitimate callback and the ability to send altered replay requests, so the attack vector is considered local to the application context rather than remote. Given the low EPSS value, immediate patch is recommended but the risk is not urgent for all users.
OpenCVE Enrichment
Github GHSA