<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Replay-Attack — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/replay-attack/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/replay-attack/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Webhook Replay Vulnerability (CVE-2026-41395)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-webhook-replay/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-webhook-replay/</guid><description>OpenClaw before 2026.3.28 is vulnerable to webhook replay attacks due to improper signature verification, allowing attackers to reorder query parameters and trigger duplicate voice-call processing.</description><content:encoded><![CDATA[<p>OpenClaw before version 2026.3.28 is susceptible to a webhook replay vulnerability affecting Plivo V3 signature verification. The vulnerability arises from the application&rsquo;s method of canonicalizing query parameter ordering for signature verification while simultaneously employing raw URLs for replay detection. This discrepancy allows attackers to manipulate the order of query parameters within a captured, valid, signed webhook, effectively bypassing the replay cache detection mechanism. This could lead to the unintended execution of duplicate voice-call processing. The vulnerability was reported on April 28, 2026, and poses a risk to systems relying on OpenClaw for processing Plivo webhooks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker captures a valid, signed webhook request from Plivo to OpenClaw.</li>
<li>Attacker analyzes the captured webhook request, noting the query parameters and their order.</li>
<li>Attacker reorders the query parameters in the captured webhook request, while maintaining the validity of the signature (due to OpenClaw&rsquo;s canonicalization of query ordering for signature verification).</li>
<li>Attacker replays the modified webhook request to the OpenClaw server.</li>
<li>OpenClaw processes the replayed webhook request because the replay detection mechanism is bypassed due to the reordered query parameters resulting in a different raw URL.</li>
<li>The OpenClaw application initiates a duplicate voice-call processing as a result of the replayed webhook.</li>
<li>The victim experiences unintended or duplicate voice calls.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to unintended or duplicate voice calls, potentially causing disruption of services and financial implications due to unnecessary call charges. While the direct impact is limited to the processing of voice calls, the vulnerability highlights a weakness in webhook security that could be exploited further in other contexts. The severity is rated as HIGH with a CVSS v3.1 score of 7.5.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.28 or later to remediate the vulnerability (CVE-2026-41395).</li>
<li>Implement server-side logging for all incoming webhook requests, capturing the raw request URL and timestamp. Deploy the Sigma rule <code>Detect Suspicious Webhook Replay</code> to identify potential replay attacks based on duplicate URLs within a short timeframe.</li>
<li>Consider implementing additional server-side validation of webhook requests, such as verifying the timestamp to ensure it falls within an acceptable window.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>webhook</category><category>replay-attack</category><category>plivo</category></item><item><title>OpenClaw Bootstrap Code Replay Vulnerability (CVE-2026-32987)</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-replay/</link><pubDate>Sun, 29 Mar 2026 13:17:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-replay/</guid><description>OpenClaw before 2026.3.13 is vulnerable to a replay attack during device pairing verification, allowing attackers to repeatedly verify a bootstrap code and escalate privileges to operator.admin.</description><content:encoded><![CDATA[<p>OpenClaw before version 2026.3.13 contains a vulnerability in the device pairing verification process.  Specifically, the <code>src/infra/device-bootstrap.ts</code> file allows bootstrap setup codes to be replayed. This means an attacker can repeatedly use the same valid bootstrap code before it is approved, leading to an escalation of pending pairing scopes. The most critical outcome is privilege escalation to the <code>operator.admin</code> level, granting the attacker significant control over the affected system…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>replay-attack</category><category>privilege-escalation</category><category>device-pairing</category></item></channel></rss>