Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
9.2
OpenClaw Voice-Call Extension Allows Unauthenticated Calls
CVE-2026-28446
GHSA-4rj2-gpmh-qq5x
Summary
Old versions of OpenClaw with the voice-call extension enabled may allow unauthorized calls to access the system. This can happen when an attacker makes a call without a caller ID or with a number that ends with allowed digits. To fix, update to OpenClaw version 2026.2.1 or later.
What to do
- Update steipete openclaw to version 2026.2.2.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| steipete | openclaw | <= 2026.2.2 | 2026.2.2 |
| openclaw | openclaw | <= 2026.2.2 | – |
Original title
OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and enabled contain an authentication bypass vulnerability in inbound allowlist policy validation that accepts empty call...
Original description
OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and enabled contain an authentication bypass vulnerability in inbound allowlist policy validation that accepts empty caller IDs and uses suffix-based matching instead of strict equality. Remote attackers can bypass inbound access controls by placing calls with missing caller IDs or numbers ending with allowlisted digits to reach the voice-call agent and execute tools.
nvd CVSS3.1
9.4
nvd CVSS4.0
9.2
Vulnerability type
CWE-287
Improper Authentication
CWE-303
- https://github.com/openclaw/openclaw/commit/f8dfd034f5d9235c5485f492a9e4ccc114e9...
- https://github.com/openclaw/openclaw/security/advisories/GHSA-4rj2-gpmh-qq5x
- https://www.vulncheck.com/advisories/openclaw-inbound-allowlist-policy-bypass-in...
- https://github.com/openclaw/openclaw/releases/tag/v2026.2.2
- https://github.com/advisories/GHSA-4rj2-gpmh-qq5x
- https://nvd.nist.gov/vuln/detail/CVE-2026-28446
Published: 5 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026