GHSA-j56c-wpqm-h24x: Duplicate Advisory: OpenClaw: Plivo V2 verified replay identity drifts on query-only variants
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-cg6c-q2hx-69h7. This link is maintained to preserve external references.
Original Description
OpenClaw before 2026.3.23 contains a replay identity vulnerability in Plivo V2 signature verification that allows attackers to bypass replay protection by modifying query parameters. The verification path derives replay keys from the full URL including query strings instead of the canonicalized base URL, enabling attackers to mint new verified request keys through unsigned query-only changes to signed requests.
References
- github.com/advisories/GHSA-j56c-wpqm-h24x
- github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dac87
- github.com/openclaw/openclaw/commit/b0ce53a79cf63834660270513e26d921899b4e5b
- github.com/openclaw/openclaw/security/advisories/GHSA-cg6c-q2hx-69h7
- nvd.nist.gov/vuln/detail/CVE-2026-35618
- www.vulncheck.com/advisories/openclaw-replay-identity-drift-via-query-only-variants-in-plivo-v2-verification
Code Behaviors & Features
Detect and mitigate GHSA-j56c-wpqm-h24x with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →