CVE-2026-28446 - Vulnerability Analysis
CriticalCVSS: 9.4Last Updated: March 6, 2026
OpenClaw - Authentication Bypass
Overview
OpenClaw < 2026.2.1 with voice-call extension contains an authentication bypass caused by improper inbound allowlist policy validation accepting empty caller IDs and suffix-based matching, letting remote attackers bypass access controls and execute tools.
Severity & Score
Impact
Remote attackers can bypass inbound access controls to reach voice-call agents and execute tools, potentially compromising system integrity.
Mitigation
Update to version 2026.2.1 or later.
References
Social Media Activity(1 post)
š“ CVE-2026-28446 - Critical (9.8) OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and enabled contain an authentication bypass vulnerability in inbound allowlist policy validation that accepts empty caller IDs and uses suffix-based matching instead of s... š https://www.thehackerwire.com/vulnerability/CVE-2026-28446/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-28446
- Severity
- Critical
- CVSS Score
- 9.4
- Type
- broken_authentication
- Status
- new
- EPSS
- 26.4%
- Social Posts
- 1
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L