Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-28446 β€” AI Deep Analysis Summary

CVSS 9.4 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: OpenClaw < 2026.2.1 has a critical **Inbound Allowlist Policy Bypass**. πŸ“‰ **Consequences**: Attackers can bypass access controls via voice-call extensions, leading to unauthorized remote access.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Flaw in **Inbound Allowlist Policy Validation**. Specifically, it allows bypass via **Empty Caller ID** and **Suffix Matching** logic errors. (CWE not specified in data).

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: **OpenClaw** (Open-source AI Assistant). πŸ“¦ **Versions**: All versions **before 2026.2.1**. 🏒 **Vendor**: OpenClaw.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Actions**: Remote attackers can **bypass inbound access control**. ⚠️ **Impact**: High Confidentiality & Integrity impact (CVSS C:H, I:H), Low Availability impact (A:L).

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: **LOW**. 🌐 **Network**: Remote (AV:N). πŸ”‘ **Auth**: None required (PR:N). πŸ‘οΈ **UI**: None required (UI:N). 🎯 **Complexity**: Low (AC:L).

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ§ͺ **Public Exp?**: No specific PoC code provided in data. πŸ“’ **Advisories**: VulnCheck and GitHub Security Advisory (GHSA-4rj2-gpmh-qq5x) confirm the flaw exists.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for **OpenClaw** installations. πŸ“ž **Focus**: Check **voice-call extensions** for allowlist policy configurations. πŸ†š **Version**: Verify if version is < 2026.2.1.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed?**: **YES**. πŸ› οΈ **Patch**: Version **2026.2.1** and later. πŸ“ **Commit**: See GitHub commit f8dfd034f5d9235c5485f492a9e4ccc114e97fdb.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Mitigate by restricting **inbound voice-call extensions**. 🚫 **Block**: Empty Caller IDs if possible. πŸ›‘ **Isolate**: Limit network access to the service until patched.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. πŸ“ˆ **CVSS**: High severity (C:H, I:H). ⏳ **Action**: Patch immediately to 2026.2.1+ to prevent remote bypass attacks.