Description
OpenClaw before 2026.4.2 fails to normalize trailing-dot localhost hosts in remote CDP discovery responses, allowing bypass of loopback protections. Attackers can craft hostile discovery responses returning localhost. to retarget authenticated browser control toward localhost endpoints and expose browser state.
Problem types
CWE-639 Authorization Bypass Through User-Controlled Key
Product status
Any version before 2026.4.2
2026.4.2 (semver)
Credits
smaeljaish771
KeenSecurityLab
References
github.com/...enclaw/security/advisories/GHSA-fh32-73r9-rgh5 (GitHub Security Advisory (GHSA-fh32-73r9-rgh5))
github.com/...ommit/9c22d636697336a6b22b0ae24798d8b8325d7828 (Patch Commit)
www.vulncheck.com/...trailing-dot-localhost-in-cdp-discovery (VulnCheck Advisory: OpenClaw < 2026.4.2 - Loopback Protection Bypass via Trailing-Dot Localhost in CDP Discovery)