LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-28446

CVE-2026-28446 - Vulnerability Analysis

CriticalCVSS: 9.4

Last Updated: March 6, 2026

OpenClaw - Authentication Bypass

Published: March 5, 2026Updated: March 6, 2026Remote Exploitable

Overview

OpenClaw < 2026.2.1 with voice-call extension contains an authentication bypass caused by improper inbound allowlist policy validation accepting empty caller IDs and suffix-based matching, letting remote attackers bypass access controls and execute tools.

Severity & Score

Severity: Critical
CVSS Score: 9.4
EPSS Score: 26.4%(Probability of exploitation in next 30 days)

Impact

Remote attackers can bypass inbound access controls to reach voice-call agents and execute tools, potentially compromising system integrity.

Mitigation

Update to version 2026.2.1 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 6, 2026

šŸ”“ CVE-2026-28446 - Critical (9.8) OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and enabled contain an authentication bypass vulnerability in inbound allowlist policy validation that accepts empty caller IDs and uses suffix-based matching instead of s... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-28446/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-28446
Severity
Critical
CVSS Score
9.4
Type
broken_authentication
Status
new
EPSS
26.4%
Social Posts
1

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

EPSS Score

26.4%Probability of exploitation in the next 30 days