CVE-2026-35618
Replay Identity Bypass in OpenClaw Plivo V2 Signature Verification
Publication date: 2026-04-09
Last updated on: 2026-04-17
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | to 2026.3.23 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-294 | A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in OpenClaw versions before 2026.3.23 and involves the Plivo V2 signature verification process. Attackers can bypass replay protection by modifying query parameters in the URL. The issue arises because the verification process derives replay keys from the full URL including query strings, rather than from a canonicalized base URL. This allows attackers to create new verified request keys by making unsigned changes only to the query parameters of signed requests.
How can this vulnerability impact me? :
This vulnerability can allow attackers to bypass replay protection mechanisms, potentially enabling them to resend or replay previously valid requests with modified query parameters. This could lead to unauthorized actions or data manipulation, as the system may accept these replayed requests as legitimate due to the flawed verification process.