OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.14 contain a vulnerability in the sandbox browser bridge server in which it accepts requests without requiring gateway authentication, allowing local attackers to access browser control endpoints. A local attacker can enumerate tabs, retrieve WebSocket URLs, execute JavaScript, and exfiltrate cookies and session data from authenticated browser contexts.
References
Configurations
History
11 Mar 2026, 16:00
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
|
| References | () https://github.com/openclaw/openclaw/commit/4711a943e30bc58016247152ba06472dab09d0b0 - Patch | |
| References | () https://github.com/openclaw/openclaw/commit/6dd6bce997c48752134f2d6ed89b27de01ced7e3 - Patch | |
| References | () https://github.com/openclaw/openclaw/commit/cd84885a4ac78eadb7bf321aae98db9519426d67 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-h9g4-589h-68xv - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-beta-authentication-bypass-in-sandbox-browser-bridge-server - Third Party Advisory |
09 Mar 2026, 13:36
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
06 Mar 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.7 |
05 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-05 22:16
Updated : 2026-03-11 16:00
NVD link : CVE-2026-28468
Mitre link : CVE-2026-28468
CVE.ORG link : CVE-2026-28468
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-306
Missing Authentication for Critical Function
