Description
OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and enabled contain an authentication bypass vulnerability in inbound allowlist policy validation that accepts empty caller IDs and uses suffix-based matching instead of strict equality. Remote attackers can bypass inbound access controls by placing calls with missing caller IDs or numbers ending with allowlisted digits to reach the voice-call agent and execute tools.
Problem types
Incorrect Implementation of Authentication Algorithm
Product status
Any version before 2026.2.1
Credits
Petr Simecek (@simecek)
@MegaManSec (https://joshua.hu) of AISLE Research Team
Stanislav Fort, Aisle Research, www.aisle.com
References
github.com/...enclaw/security/advisories/GHSA-4rj2-gpmh-qq5x (GitHub Security Advisory (GHSA-4rj2-gpmh-qq5x))
github.com/...ommit/f8dfd034f5d9235c5485f492a9e4ccc114e97fdb (Patch Commit)
www.vulncheck.com/...oice-call-extension-via-empty-caller-id (VulnCheck Advisory: OpenClaw < 2026.2.1 - Inbound Allowlist Policy Bypass in voice-call Extension via Empty Caller ID and Suffix Matching)