Description
OpenClaw before 2026.3.31 contains a replay detection bypass vulnerability in webhook signature handling that treats Base64 and Base64URL encoded signatures as distinct requests. Attackers can re-encode Telnyx webhook signatures to bypass replay detection while maintaining valid signature verification.
Published: 2026-04-23
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Replay Attack
Action: Immediately Patch
AI Analysis

Impact

OpenClaw versions prior to 2026.3.31 allow an attacker to bypass the webhook replay detection mechanism by re-encoding Telnyx webhook signatures from Base64 to Base64URL or vice‑versa. The signature verification logic treats these two encodings as distinct, so an attacker can replay a verified request without triggering the replay guard. The result is that the same webhook payload can be processed multiple times, potentially leading to duplicate operations, double charges, or other unintended side effects. The weakness is a cryptographic parameter handling issue (CWE-294).

Affected Systems

The vulnerability affects the OpenClaw product released by OpenClaw in all versions prior to 2026.3.31. No specific patch versions are provided beyond the statement that upgrading beyond 2026.3.31 resolves the issue.

Risk and Exploitability

The CVSS score of 6.3 indicates moderate severity. The EPSS score is below 1%, implying a very low likelihood of widespread exploitation at present. The vulnerability is not listed in CISA’s KEV catalog, suggesting that no widespread, targeted attacks have been observed yet. However, if attackers obtain a valid webhook signature for a legitimate Telnyx integration, they can easily re‑encode it to replay the message; therefore the attack can be performed by anyone who can capture the signature during normal operation. The described exploit path requires only the ability to see or capture a legitimate webhook request, then re‑encode its signature before re‑sending it to the OpenClaw webhook endpoint.

Generated by OpenCVE AI on April 28, 2026 at 14:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy the official OpenClaw update to version 2026.3.31 or newer.
  • If an update cannot be applied immediately, restrict access to the webhook endpoint using IP whitelisting for Telnyx’s known inbound addresses.
  • Implement strict canonical Base64 decoding in the signature verification code so that Base64 and Base64URL encodings are treated as equivalent, preventing replay of re‑encoded signatures.

Generated by OpenCVE AI on April 28, 2026 at 14:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-37v6-fxx8-xjmx OpenClaw: Telnyx Webhook Replay Detection Bypass via Base64 Signature Re-encoding
History

Fri, 24 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.31 contains a replay detection bypass vulnerability in webhook signature handling that treats Base64 and Base64URL encoded signatures as distinct requests. Attackers can re-encode Telnyx webhook signatures to bypass replay detection while maintaining valid signature verification.
Title OpenClaw < 2026.3.31 - Webhook Replay Detection Bypass via Base64 Signature Re-encoding
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-294
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-24T13:33:45.799Z

Reserved: 2026-04-20T14:07:26.648Z

Link: CVE-2026-41351

cve-icon Vulnrichment

Updated: 2026-04-24T13:33:43.081Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-23T22:16:42.160

Modified: 2026-04-28T18:56:43.543

Link: CVE-2026-41351

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T14:45:16Z

Weaknesses