Home

Description

OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and enabled contain an authentication bypass vulnerability in inbound allowlist policy validation that accepts empty caller IDs and uses suffix-based matching instead of strict equality. Remote attackers can bypass inbound access controls by placing calls with missing caller IDs or numbers ending with allowlisted digits to reach the voice-call agent and execute tools.

PUBLISHED Reserved 2026-02-27 | Published 2026-03-05 | Updated 2026-03-06 | Assigner VulnCheck




CRITICAL: 9.2CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N

CRITICAL: 9.4CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

Problem types

Incorrect Implementation of Authentication Algorithm

Product status

Default status
unaffected

Any version before 2026.2.1
affected

Credits

Petr Simecek (@simecek) reporter

@MegaManSec (https://joshua.hu) of AISLE Research Team reporter

Stanislav Fort, Aisle Research, www.aisle.com analyst

References

github.com/...enclaw/security/advisories/GHSA-4rj2-gpmh-qq5x (GitHub Security Advisory (GHSA-4rj2-gpmh-qq5x)) vendor-advisory

github.com/...ommit/f8dfd034f5d9235c5485f492a9e4ccc114e97fdb (Patch Commit) patch

www.vulncheck.com/...oice-call-extension-via-empty-caller-id (VulnCheck Advisory: OpenClaw < 2026.2.1 - Inbound Allowlist Policy Bypass in voice-call Extension via Empty Caller ID and Suffix Matching) third-party-advisory

cve.org (CVE-2026-28446)

nvd.nist.gov (CVE-2026-28446)

Download JSON