CVE-2026-28468
📋 TL;DR
OpenClaw sandbox browser bridge server accepts requests without gateway authentication, allowing local attackers to access browser control endpoints. This enables enumeration of tabs, retrieval of WebSocket URLs, JavaScript execution, and exfiltration of cookies/session data from authenticated browser contexts. Affects OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.14.
💻 Affected Systems
- OpenClaw
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Local attacker gains full control over browser sessions, steals authentication tokens and sensitive data, executes arbitrary JavaScript in authenticated contexts, and potentially pivots to other systems using stolen credentials.
Likely Case
Local attacker enumerates browser tabs, extracts session cookies and authentication data, and executes JavaScript in browser contexts to steal sensitive information or perform actions as the authenticated user.
If Mitigated
With proper authentication controls, only authorized users can access browser control endpoints, preventing unauthorized access to browser sessions and data.
🎯 Exploit Status
Exploitation requires local access to the system but no authentication. Simple HTTP requests to the vulnerable endpoints can trigger the vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2026.2.14 and later
Vendor Advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-h9g4-589h-68xv
Restart Required: Yes
Instructions:
1. Update OpenClaw to version 2026.2.14 or later. 2. Restart the OpenClaw service. 3. Verify the update by checking the version.
🔧 Temporary Workarounds
Disable sandbox browser bridge server
linuxTemporarily disable the vulnerable component until patching is possible
systemctl stop openclaw-browser-bridge
killall openclaw-browser-bridge
Implement network isolation
linuxRestrict access to the browser bridge server port using firewall rules
iptables -A INPUT -p tcp --dport [BRIDGE_PORT] -j DROP
ufw deny [BRIDGE_PORT]
🧯 If You Can't Patch
- Isolate systems running vulnerable OpenClaw versions from other critical systems
- Implement strict local access controls and monitoring on affected systems
🔍 How to Verify
Check if Vulnerable:
Check OpenClaw version: if version is between 2026.1.29-beta.1 and 2026.2.13 (inclusive), system is vulnerable. Test by attempting to access browser bridge endpoints without authentication.
Check Version:
openclaw --version
Verify Fix Applied:
Verify OpenClaw version is 2026.2.14 or later. Test that browser bridge endpoints now require proper authentication.
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated access attempts to browser bridge endpoints
- Unusual JavaScript execution events from browser bridge
- Multiple tab enumeration requests from localhost
Network Indicators:
- HTTP requests to browser bridge endpoints without authentication headers
- Unusual WebSocket connections initiated from browser bridge server
SIEM Query:
source="openclaw.log" AND ("authentication failed" OR "unauthorized access" OR "browser bridge")
🔗 References
- https://github.com/openclaw/openclaw/commit/4711a943e30bc58016247152ba06472dab09d0b0
- https://github.com/openclaw/openclaw/commit/6dd6bce997c48752134f2d6ed89b27de01ced7e3
- https://github.com/openclaw/openclaw/commit/cd84885a4ac78eadb7bf321aae98db9519426d67
- https://github.com/openclaw/openclaw/security/advisories/GHSA-h9g4-589h-68xv
- https://www.vulncheck.com/advisories/openclaw-beta-authentication-bypass-in-sandbox-browser-bridge-server