Nixpkgs Security Tracker

Login with GitHub

Suggestion detail

Dismissed
updated 6 days, 11 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
OpenClaw < 2026.2.1 - Inbound Allowlist Policy Bypass in voice-call Extension via Empty Caller ID and Suffix Matching

OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and enabled contain an authentication bypass vulnerability in inbound allowlist policy validation that accepts empty caller IDs and uses suffix-based matching instead of strict equality. Remote attackers can bypass inbound access controls by placing calls with missing caller IDs or numbers ending with allowlisted digits to reach the voice-call agent and execute tools.

Affected products

OpenClaw
  • <2026.2.1

Matching in nixpkgs

Package maintainers

Unaffected, never had 2026.2.1 or older.