CVE-2026-28468

OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.14 contain a vulnerability in the sandbox browser bridge server in which it accepts requests without requiring gateway authentication, allowing local attackers to access browser control endpoints. A local attacker can enumerate tabs, retrieve WebSocket URLs, execute JavaScript, and exfiltrate cookies and session data from authenticated browser contexts.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

11 Mar 2026, 16:00

Type Values Removed Values Added
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
First Time Openclaw openclaw
Openclaw
References () https://github.com/openclaw/openclaw/commit/4711a943e30bc58016247152ba06472dab09d0b0 - () https://github.com/openclaw/openclaw/commit/4711a943e30bc58016247152ba06472dab09d0b0 - Patch
References () https://github.com/openclaw/openclaw/commit/6dd6bce997c48752134f2d6ed89b27de01ced7e3 - () https://github.com/openclaw/openclaw/commit/6dd6bce997c48752134f2d6ed89b27de01ced7e3 - Patch
References () https://github.com/openclaw/openclaw/commit/cd84885a4ac78eadb7bf321aae98db9519426d67 - () https://github.com/openclaw/openclaw/commit/cd84885a4ac78eadb7bf321aae98db9519426d67 - Patch
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-h9g4-589h-68xv - () https://github.com/openclaw/openclaw/security/advisories/GHSA-h9g4-589h-68xv - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-beta-authentication-bypass-in-sandbox-browser-bridge-server - () https://www.vulncheck.com/advisories/openclaw-beta-authentication-bypass-in-sandbox-browser-bridge-server - Third Party Advisory

09 Mar 2026, 13:36

Type Values Removed Values Added
Summary
  • (es) Versiones de OpenClaw 2026.1.29-beta.1 anteriores a 2026.2.14 contienen una vulnerabilidad en el servidor puente del navegador sandbox en el que acepta solicitudes sin requerir autenticación de la pasarela, permitiendo a atacantes locales acceder a puntos finales de control del navegador. Un atacante local puede enumerar pestañas, recuperar URLs de WebSocket, ejecutar JavaScript y exfiltrar cookies y datos de sesión de contextos de navegador autenticados.

06 Mar 2026, 17:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 7.7

05 Mar 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-05 22:16

Updated : 2026-03-11 16:00


NVD link : CVE-2026-28468

Mitre link : CVE-2026-28468

CVE.ORG link : CVE-2026-28468


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-306

Missing Authentication for Critical Function