Impact
OpenClaw versions earlier than 2026.2.12 allow callers to invoke requests to the /agent/act browser‑control HTTP route without authentication. This missing authentication permits the caller to execute arbitrary browser‑context actions and retrieve sensitive in‑session data, effectively compromising that local execution context.
Affected Systems
The vulnerable product is OpenClaw (OpenClaw documentation indicates node.js as the underlying runtime). Affected releases span 2026.1.5 up through the 2026.2.11 series. No other vendors or products are listed.
Risk and Exploitability
The vulnerability has a CVSS score of 7.5 and an EPSS score of less than 1%, indicating a moderate likelihood of exploitation. It has not yet been identified in the CISA KEV catalog. Because the attack vector relies on a local network or local process, a remote attacker who can reach the target machine (within the same network segment or via an installed local process) can send unauthenticated requests to the vulnerable endpoint and gain privileged browser‑context access.
OpenCVE Enrichment