CVE-2026-28446

CRITICAL

OpenClaw <2026.2.1 - Auth Bypass

Title source: llm
STIX 2.1

Description

OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and enabled contain an authentication bypass vulnerability in inbound allowlist policy validation that accepts empty caller IDs and uses suffix-based matching instead of strict equality. Remote attackers can bypass inbound access controls by placing calls with missing caller IDs or numbers ending with allowlisted digits to reach the voice-call agent and execute tools.

Scores

CVSS v3 9.4
EPSS 0.0098
EPSS Percentile 76.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

CWE
CWE-303
Status published
Products (2)
npm/openclaw 0 - 2026.2.2npm
openclaw/openclaw < 2026.2.2
Published Mar 05, 2026
Tracked Since Mar 06, 2026