CVE-2026-32053: OpenClaw's voice-call Twilio webhook replay could bypass manager dedupe because normalized event IDs were randomized per parse
(updated )
Twilio webhook replay events could bypass voice-call manager dedupe because normalized event IDs were randomized per parse. A replayed event could be treated as new and trigger duplicate or stale call-state transitions.
References
- github.com/advisories/GHSA-vqx8-9xxw-f2m7
- github.com/openclaw/openclaw
- github.com/openclaw/openclaw/commit/1d28da55a5d0ff409e34999e0961157e9db0a2ab
- github.com/openclaw/openclaw/security/advisories/GHSA-vqx8-9xxw-f2m7
- nvd.nist.gov/vuln/detail/CVE-2026-32053
- www.vulncheck.com/advisories/openclaw-twilio-webhook-replay-bypass-via-randomized-event-id-normalization
Code Behaviors & Features
Detect and mitigate CVE-2026-32053 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →