Impact
This flaw lets an attacker reaching the host’s loopback interface start the sandbox browser’s noVNC observer without any authentication. By opening a VNC session, the attacker can view and potentially manipulate the browser environment, bypassing local access controls. The issue is an authentication bypass (CWE‑306).
Affected Systems
All OpenClaw public releases before version 2026.2.21 are impacted. The vulnerability exists in the OpenClaw sandbox browser application and is fixed in release 2026.2.21 and later.
Risk and Exploitability
The CVSS base score of 8.5 reflects high severity. Although the EPSS score is not published and the flaw is not listed in CISA’s KEV catalog, the local attack surface means any host running an unpatched OpenClaw instance is at risk of unauthorized interaction, making it essential to apply the patch quickly.
OpenCVE Enrichment
Github GHSA