Impact
OpenClaw versions earlier than 2026.3.1 do not correctly handle errors that occur during authentication bootstrap when the application starts, leaving browser‑control routes accessible without an authorization check. The server therefore serves routes that include evaluate‑capable actions, which, if invoked, can execute arbitrary code triggered by the attacker. The vulnerability therefore allows an unauthenticated attacker who can reach the application via a local process or a loopback‑reachable server‑side request forgery (SSRF) to potentially run code on the host without valid credentials.
Affected Systems
The affected product is OpenClaw by OpenClaw as identified by the CPE string cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*. All releases prior to the 2026.3.1 update are vulnerable. The fix is incorporated in OpenClaw 2026.3.1 and later.
Risk and Exploitability
The CVSS score is 7.5, classifying the vulnerability as high severity. Exploit probability data (EPSS) is not available, and the issue is not listed in the CISA Known Exploited Vulnerabilities catalog. According to the description, the attack vector requires an attacker who can direct traffic to the vulnerable browser‑control endpoints, such as a local application or a loopback‑reachable SSRF path.
OpenCVE Enrichment
Github GHSA