No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 29 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.28 contains a webhook replay vulnerability in Plivo V3 signature verification that canonicalizes query ordering for signatures but hashes raw URLs for replay detection. Attackers can reorder query parameters to bypass replay cache detection and trigger duplicate voice-call processing with a captured valid signed webhook. | |
| Title | OpenClaw < 2026.3.28 - Webhook Replay via Query Parameter Reordering in Plivo V3 | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-325 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-29T13:27:00.547Z
Reserved: 2026-04-20T14:13:45.349Z
Link: CVE-2026-41395
Updated: 2026-04-29T13:26:48.281Z
Status : Awaiting Analysis
Published: 2026-04-28T19:37:42.880
Modified: 2026-04-28T20:10:23.367
Link: CVE-2026-41395
No data.
OpenCVE Enrichment
Updated: 2026-04-28T23:15:43Z