Impact
The vulnerability resides in the sandbox browser bridge server of OpenClaw versions 2026.1.29-beta.1 through 2026.2.13, where it accepts incoming requests without requiring gateway authentication. This constitutes an authentication bypass that allows an attacker with local access to the system to interact with browser control endpoints. The attacker can enumerate open tabs, retrieve WebSocket URLs, execute arbitrary JavaScript, and exfiltrate cookies and session data from authenticated browser contexts. The primary impact is the compromise of confidentiality for data accessed within authenticated browser sessions.
Affected Systems
OpenClaw OpenClaw, versions 2026.1.29-beta.1 up to but not including 2026.2.14. The affected component is a node.js based sandbox browser bridge server running locally on the host.
Risk and Exploitability
The CVSS score of 8.5 indicates a high severity vulnerability, while the EPSS score of less than 1% reflects a low probability of exploitation in the general population. The vulnerability is not listed in the CISA KEV catalog. Because authentication is bypassed with no network authentication mechanisms, the attack vector is local; an attacker must have local access to the machine hosting the bridge server. If obtained, the attacker can gain access to sensitive session data and potentially impersonate users within the browser context. This moderate exploitation likelihood combined with high impact warrants urgent mitigation.
OpenCVE Enrichment
Github GHSA