Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-37v6-fxx8-xjmx | OpenClaw: Telnyx Webhook Replay Detection Bypass via Base64 Signature Re-encoding |
Fri, 24 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Apr 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.31 contains a replay detection bypass vulnerability in webhook signature handling that treats Base64 and Base64URL encoded signatures as distinct requests. Attackers can re-encode Telnyx webhook signatures to bypass replay detection while maintaining valid signature verification. | |
| Title | OpenClaw < 2026.3.31 - Webhook Replay Detection Bypass via Base64 Signature Re-encoding | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-294 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-24T13:33:45.799Z
Reserved: 2026-04-20T14:07:26.648Z
Link: CVE-2026-41351
Updated: 2026-04-24T13:33:43.081Z
Status : Analyzed
Published: 2026-04-23T22:16:42.160
Modified: 2026-04-28T18:56:43.543
Link: CVE-2026-41351
No data.
OpenCVE Enrichment
Updated: 2026-04-28T14:45:16Z
Github GHSA