CVE-2026-28446
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Lifecycle Timeline
4Description
OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and enabled contain an authentication bypass vulnerability in inbound allowlist policy validation that accepts empty caller IDs and uses suffix-based matching instead of strict equality. Remote attackers can bypass inbound access controls by placing calls with missing caller IDs or numbers ending with allowlisted digits to reach the voice-call agent and execute tools.
Analysis
Auth bypass in OpenClaw voice-call extension before 2026.2.1. EPSS 0.68%. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: identify all OpenClaw deployments with voice-call extension enabled and assess exposure scope. Within 7 days: apply vendor patch 2026.2.1 or later to all affected systems, prioritizing production environments; if patching is delayed, disable the voice-call extension. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
GHSA-4rj2-gpmh-qq5x