#VU125084 Authentication Bypass by Capture-replay in OpenClaw - CVE-2026-28449
Published: April 7, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote attacker to trigger duplicate inbound processing.
The vulnerability exists due to authentication bypass by capture-replay in the Nextcloud Talk webhook path when handling previously valid signed webhook requests without durable replay suppression. A remote attacker can replay a captured signed request to trigger duplicate inbound processing.
The issue is limited to deployments using the Nextcloud Talk webhook integration and may be triggered after replay-window expiry or process restart.