#VU125070 Authentication Bypass by Capture-replay in OpenClaw

 

#VU125070 Authentication Bypass by Capture-replay in OpenClaw

Published: April 7, 2026


Vulnerability identifier: #VU125070
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: N/A
CWE-ID: CWE-294
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
OpenClaw
Software vendor:
OpenClaw

Description

The vulnerability allows a remote attacker to cause a denial of service.

The vulnerability exists due to authentication bypass by capture-replay in the voice-call Twilio webhook path when handling replayed signed webhook requests with a mutated unsigned i-twilio-idempotency-token header. A remote attacker can replay a valid signed request while changing only the unsigned idempotency header to cause a denial of service.

Only deployments using the optional voice-call Twilio webhook path are vulnerable.


Remediation

Install security update from vendor's website.

External links