Vulnerability Description
OpenClaw before 2026.3.23 contains a replay identity vulnerability in Plivo V2 signature verification that allows attackers to bypass replay protection by modifying query parameters. The verification path derives replay keys from the full URL including query strings instead of the canonicalized base URL, enabling attackers to mint new verified request keys through unsigned query-only changes to signed requests.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openclaw | Openclaw | < 2026.3.23 |
Related Weaknesses (CWE)
References
- https://github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dPatch
- https://github.com/openclaw/openclaw/commit/b0ce53a79cf63834660270513e26d921899bPatch
- https://github.com/openclaw/openclaw/security/advisories/GHSA-cg6c-q2hx-69h7Vendor Advisory
- https://www.vulncheck.com/advisories/openclaw-replay-identity-drift-via-query-onThird Party Advisory
FAQ
What is CVE-2026-35618?
CVE-2026-35618 is a vulnerability with a CVSS score of 6.5 (MEDIUM). OpenClaw before 2026.3.23 contains a replay identity vulnerability in Plivo V2 signature verification that allows attackers to bypass replay protection by modifying query parameters. The verification ...
How severe is CVE-2026-35618?
CVE-2026-35618 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-35618?
Check the references section above for vendor advisories and patch information. Affected products include: Openclaw Openclaw.