OpenClaw Webhook Event Deduplication Flaw in Twilio Integration
CVE-2026-32053

6.9MEDIUM

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
21 March 2026

What is CVE-2026-32053?

OpenClaw versions earlier than 2026.2.23 are susceptible to a vulnerability in the Twilio webhook event deduplication mechanism. The issue arises from the randomization of normalized event IDs upon each parse, which enables attackers to execute replay attacks. This could result in the triggering of duplicate events, leading to erroneous state transitions in call handling systems and overall corruption of call states. This flaw poses a significant risk to the reliability and integrity of integrations relying on Twilio webhooks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

OpenClaw 0 < 2026.2.23

OpenClaw 2026.2.23

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Jisung (@jiseoung)
.