Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
9.2

OpenClaw Voice-Call Extension Allows Unauthenticated Calls

CVE-2026-28446 GHSA-4rj2-gpmh-qq5x
Summary

Old versions of OpenClaw with the voice-call extension enabled may allow unauthorized calls to access the system. This can happen when an attacker makes a call without a caller ID or with a number that ends with allowed digits. To fix, update to OpenClaw version 2026.2.1 or later.

What to do
  • Update steipete openclaw to version 2026.2.2.
Affected software
VendorProductAffected versionsFix available
steipete openclaw <= 2026.2.2 2026.2.2
openclaw openclaw <= 2026.2.2 –
Original title
OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and enabled contain an authentication bypass vulnerability in inbound allowlist policy validation that accepts empty call...
Original description
OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and enabled contain an authentication bypass vulnerability in inbound allowlist policy validation that accepts empty caller IDs and uses suffix-based matching instead of strict equality. Remote attackers can bypass inbound access controls by placing calls with missing caller IDs or numbers ending with allowlisted digits to reach the voice-call agent and execute tools.
nvd CVSS3.1 9.4
nvd CVSS4.0 9.2
Vulnerability type
CWE-287 Improper Authentication
CWE-303
Published: 5 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026