Home

Description

OpenClaw before 2026.4.10 contains an improper network binding vulnerability in the sandbox browser CDP relay that exposes Chrome DevTools Protocol on 0.0.0.0. Attackers can access the DevTools protocol outside intended local sandbox boundaries by exploiting the overly broad binding configuration.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-06 | Updated 2026-05-07 | Assigner VulnCheck




CRITICAL: 9.0CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

CRITICAL: 9.6CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-1188 Initialization of a Resource with an Insecure Default

Product status

Default status
unaffected

Any version before 2026.4.10
affected

2026.4.10 (semver)
unaffected

Credits

R1kko1337 reporter

References

github.com/...enclaw/security/advisories/GHSA-525j-hqq2-66r4 (GitHub Security Advisory (GHSA-525j-hqq2-66r4)) vendor-advisory

github.com/...ommit/fbf11ebdb7110632f93926d0ac7b48f04cb44d77 (Patch Commit) patch

www.vulncheck.com/...sure-via-overly-broad-cdp-relay-binding (VulnCheck Advisory: OpenClaw < 2026.4.10 - Chrome DevTools Protocol Exposure via Overly Broad CDP Relay Binding) third-party-advisory

cve.org (CVE-2026-43581)

nvd.nist.gov (CVE-2026-43581)

Download JSON