Description
OpenClaw before 2026.4.10 contains an improper network binding vulnerability in the sandbox browser CDP relay that exposes Chrome DevTools Protocol on 0.0.0.0. Attackers can access the DevTools protocol outside intended local sandbox boundaries by exploiting the overly broad binding configuration.
Published: 2026-05-06
Score: 9 Critical
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an improper network binding that allows the Chrome DevTools Protocol to be exposed on all network interfaces. Attackers can use this exposed interface outside the intended sandbox, potentially enabling arbitrary code execution or other malicious actions.

Affected Systems

OpenClaw versions prior to 2026.4.10 are affected. The issue exists in the CDP relay component used by the sandbox browser, which is part of the OpenClaw product suite.

Risk and Exploitability

CVSS score 9.0 marks it as high severity. The EPSS score is not available, so the exploitation probability is currently unknown. It is not listed in the CISA KEV catalog. Attackers can exploit the vulnerability over the network by connecting to the port where the CDP is bound to 0.0.0.0, a configuration that exposes the service to any host.

Generated by OpenCVE AI on May 6, 2026 at 21:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.4.10 or later.
  • If an upgrade is not immediately possible, reconfigure the CDP relay binding to limit it to localhost (127.0.0.1) or remove the default open binding entirely.
  • Restrict external network access to the CDP port using firewall rules or network segmentation to block inbound traffic from untrusted hosts.

Generated by OpenCVE AI on May 6, 2026 at 21:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.4.10 contains an improper network binding vulnerability in the sandbox browser CDP relay that exposes Chrome DevTools Protocol on 0.0.0.0. Attackers can access the DevTools protocol outside intended local sandbox boundaries by exploiting the overly broad binding configuration.
Title OpenClaw < 2026.4.10 - Chrome DevTools Protocol Exposure via Overly Broad CDP Relay Binding
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-1188
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 9, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-06T19:49:23.986Z

Reserved: 2026-05-01T17:00:54.537Z

Link: CVE-2026-43581

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T20:16:33.920

Modified: 2026-05-06T21:20:52.707

Link: CVE-2026-43581

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T01:30:17Z

Weaknesses