Description
OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.14 contain a vulnerability in the sandbox browser bridge server in which it accepts requests without requiring gateway authentication, allowing local attackers to access browser control endpoints. A local attacker can enumerate tabs, retrieve WebSocket URLs, execute JavaScript, and exfiltrate cookies and session data from authenticated browser contexts.
Problem types
Missing Authentication for Critical Function
Product status
2026.1.29-beta.1 (custom) before 2026.2.14
Credits
Adnan Jakati (@jackhax) of Praetorian
References
github.com/...enclaw/security/advisories/GHSA-h9g4-589h-68xv (GitHub Security Advisory (GHSA-h9g4-589h-68xv))
github.com/...ommit/4711a943e30bc58016247152ba06472dab09d0b0 (Patch Commit #1)
github.com/...ommit/6dd6bce997c48752134f2d6ed89b27de01ced7e3 (Patch Commit #2)
github.com/...ommit/cd84885a4ac78eadb7bf321aae98db9519426d67 (Patch Commit #3)
www.vulncheck.com/...bypass-in-sandbox-browser-bridge-server (VulnCheck Advisory: OpenClaw 2026.1.29-beta.1 < 2026.2.14 - Authentication Bypass in Sandbox Browser Bridge Server)