Impact
OpenClaw versions prior to 2026.2.1 contain an inbound allowlist policy validation flaw that accepts empty caller IDs and uses suffix‑based matching instead of strict equality. This allows remote callers to bypass authentication checks and reach the voice‑call agent, potentially executing arbitrary tools and commands. The flaw represents an authentication bypass (CWE-303) that can lead to unauthorized control over the voice‑call functionality.
Affected Systems
Vendors: OpenClaw; Product: OpenClaw. Vulnerable editions include any release of OpenClaw prior to 2026.2.1 that has the voice‑call extension installed and enabled. Users of newer releases or deployments without the extension are not affected.
Risk and Exploitability
The CVSS v3 rating is 9.2, indicating critical severity. EPSS is reported as slightly less than 1%, implying low current exploitation likelihood but not zero risk. The vulnerability is not listed in the CISA KEV catalog, so large‑scale exploitation has not yet been confirmed. Attackers can exploit the flaw by initiating remote voice calls with intentionally missing caller IDs or numbers ending with allowlisted digits; no additional privileges or local compromise are required.
OpenCVE Enrichment
Github GHSA