Webhook Replay Vulnerability in OpenClaw Affects Plivo V3 Signature Verification
CVE-2026-41395

8.2HIGH

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
28 April 2026

What is CVE-2026-41395?

OpenClaw versions prior to 2026.3.28 are susceptible to a webhook replay vulnerability within the Plivo V3 signature verification process. This security flaw arises from the canonicalization of query parameter ordering for signatures while relying on raw URL hashing for replay detection. Attackers can exploit this by reordering query parameters, which may permit them to circumvent replay cache detection. Consequently, this manipulation can result in unauthorized duplicate processing of voice calls triggered by a previously captured valid signed webhook, potentially leading to significant security breaches.

Affected Version(s)

OpenClaw 0 < 2026.3.28

OpenClaw 2026.3.28

References

CVSS V4

Score:
8.2
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

zsx (@zsxsoft)
KeenSecurityLab
.