GHSA-37v6-fxx8-xjmx.yaml
1 info: 2 name: OpenClaw 3 cve: GHSA-37v6-fxx8-xjmx 4 summary: OpenClaw Telnyx Webhook Replay Detection Bypass via Base64 Signature Re-encoding 5 details: >- 6 Summary 7 8 Telnyx Webhook Replay Detection Bypass via Base64 Signature Re-encoding 9 10 11 Current Maintainer Triage 12 13 - Status: narrow 14 15 - Normalized severity: low 16 17 - Assessment: Shipped v2026.3.28 replay hashing treated equivalent Telnyx Base64/Base64URL signatures as distinct requests, 18 but signature verification still held, so lower to low. 19 20 21 Affected Packages / Versions 22 23 - Package: openclaw (npm) 24 25 - Latest published npm version: 2026.3.31 26 27 - Vulnerable version range: <=2026.3.28 28 29 - Patched versions: >= 2026.3.31 30 31 - First stable tag containing the fix: v2026.3.31 32 cvss: '' 33 severity: LOW 34 security_advise: Upgrade openclaw to >= 2026.3.31 or later. Commit(s) - ad77666054651c1fd77b1dc60fd6a8db6600a29a — 2026-03-30T20:01:43+01:00 35 references: 36 - https://github.com/openclaw/openclaw/security/advisories/GHSA-37v6-fxx8-xjmx 37 rule: version <= "2026.3.28" 38 references: 39 - https://github.com/openclaw/openclaw/security/advisories/GHSA-37v6-fxx8-xjmx