Description
OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.14 contain a vulnerability in the sandbox browser bridge server in which it accepts requests without requiring gateway authentication, allowing local attackers to access browser control endpoints. A local attacker can enumerate tabs, retrieve WebSocket URLs, execute JavaScript, and exfiltrate cookies and session data from authenticated browser contexts.
Published: 2026-03-05
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass in Sandbox Browser Bridge Server
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the sandbox browser bridge server of OpenClaw versions 2026.1.29-beta.1 through 2026.2.13, where it accepts incoming requests without requiring gateway authentication. This constitutes an authentication bypass that allows an attacker with local access to the system to interact with browser control endpoints. The attacker can enumerate open tabs, retrieve WebSocket URLs, execute arbitrary JavaScript, and exfiltrate cookies and session data from authenticated browser contexts. The primary impact is the compromise of confidentiality for data accessed within authenticated browser sessions.

Affected Systems

OpenClaw OpenClaw, versions 2026.1.29-beta.1 up to but not including 2026.2.14. The affected component is a node.js based sandbox browser bridge server running locally on the host.

Risk and Exploitability

The CVSS score of 8.5 indicates a high severity vulnerability, while the EPSS score of less than 1% reflects a low probability of exploitation in the general population. The vulnerability is not listed in the CISA KEV catalog. Because authentication is bypassed with no network authentication mechanisms, the attack vector is local; an attacker must have local access to the machine hosting the bridge server. If obtained, the attacker can gain access to sensitive session data and potentially impersonate users within the browser context. This moderate exploitation likelihood combined with high impact warrants urgent mitigation.

Generated by OpenCVE AI on April 16, 2026 at 12:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to 2026.2.14 or later where the sandbox browser bridge server enforces gateway authentication.
  • If an immediate upgrade is not possible, restrict local access to the bridge server by disabling the service or binding it to a loopback interface and removing any exposed network ports.
  • Implement network segmentation or host-based firewall rules to isolate the bridge server and minimize the attack surface for local users.
  • Monitor logs for unauthorized requests to the bridge server and alert on unexpected activity.

Generated by OpenCVE AI on April 16, 2026 at 12:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-h9g4-589h-68xv OpenClaw has an authentication bypass in sandbox browser bridge server
History

Mon, 09 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Thu, 05 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.14 contain a vulnerability in the sandbox browser bridge server in which it accepts requests without requiring gateway authentication, allowing local attackers to access browser control endpoints. A local attacker can enumerate tabs, retrieve WebSocket URLs, execute JavaScript, and exfiltrate cookies and session data from authenticated browser contexts.
Title OpenClaw 2026.1.29-beta.1 < 2026.2.14 - Authentication Bypass in Sandbox Browser Bridge Server
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-306
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-09T18:00:17.001Z

Reserved: 2026-02-27T19:19:03.548Z

Link: CVE-2026-28468

cve-icon Vulnrichment

Updated: 2026-03-09T18:00:11.847Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T22:16:20.197

Modified: 2026-03-11T16:00:31.230

Link: CVE-2026-28468

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:00:11Z

Weaknesses