Exploit for CVE-2026-28446

OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and enabled contain an authentication bypass vulnerability in inbound allowlist policy validation that accepts empty caller IDs and uses suffix-based matching instead of strict equality. Remote attackers can bypass inbound access controls by placing calls with missing caller IDs or numbers ending with allowlisted digits to reach the voice-call agent and execute tools.

Published: 2026-03-05

CVSS: 9.8

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Download Exploit for CVE-2026-28446 here:

Use Tor Browser to access .onion site.

https://sonitex.com/exploit-164-cve-2026-2764/

https://sonitex.com/exploit-671-cve-2026-3804/

https://sonitex.com/exploit-430-cve-2026-3437/

https://sonitex.com/exploit-101-cve-2026-2928/