Vulnerability Description
OpenClaw before 2026.3.28 contains a webhook replay vulnerability in Plivo V3 signature verification that canonicalizes query ordering for signatures but hashes raw URLs for replay detection. Attackers can reorder query parameters to bypass replay cache detection and trigger duplicate voice-call processing with a captured valid signed webhook.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openclaw | Openclaw | < 2026.3.28 |
Related Weaknesses (CWE)
References
- https://github.com/openclaw/openclaw/security/advisories/GHSA-8689-gm9g-jgr6Vendor Advisory
- https://www.vulncheck.com/advisories/openclaw-webhook-replay-via-query-parameterThird Party Advisory
FAQ
What is CVE-2026-41395?
CVE-2026-41395 is a vulnerability with a CVSS score of 7.5 (HIGH). OpenClaw before 2026.3.28 contains a webhook replay vulnerability in Plivo V3 signature verification that canonicalizes query ordering for signatures but hashes raw URLs for replay detection. Attacker...
How severe is CVE-2026-41395?
CVE-2026-41395 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-41395?
Check the references section above for vendor advisories and patch information. Affected products include: Openclaw Openclaw.