#VU125070 Authentication Bypass by Capture-replay in OpenClaw
Published: April 7, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to authentication bypass by capture-replay in the voice-call Twilio webhook path when handling replayed signed webhook requests with a mutated unsigned i-twilio-idempotency-token header. A remote attacker can replay a valid signed request while changing only the unsigned idempotency header to cause a denial of service.
Only deployments using the optional voice-call Twilio webhook path are vulnerable.