CVE-2026-43575

OpenClaw · Sandbox Browser

OpenClaw contains an authentication bypass in the noVNC helper route, allowing unauthenticated attackers to hijack interactive browser sessions.

Executive summary

An authentication bypass in OpenClaw allows unauthenticated attackers to gain unauthorized control over interactive browser sessions via the noVNC helper.

Vulnerability

The noVNC helper route fails to enforce bridge authentication. An attacker can access this route directly to view or control an active browser session.

Business impact

This vulnerability allows for the total compromise of an active browser session, potentially leading to the theft of session tokens, sensitive data, or the execution of malicious actions on behalf of the user. With a 9.8 CVSS score, the risk of unauthorized access is critical.

Remediation

Immediate Action: Update OpenClaw to version 2026.4.10 or later immediately.

Proactive Monitoring: Monitor access logs for the noVNC helper route and investigate any requests that do not originate from authorized bridge connections.

Compensating Controls: Implement strict firewall rules to restrict access to the noVNC helper route to trusted network segments only.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Securing the noVNC helper route is critical for preventing session hijacking. Organizations should apply the update promptly and verify that authentication mechanisms are functioning as expected.