CVE-2026-43575
OpenClaw · Sandbox Browser
OpenClaw contains an authentication bypass in the noVNC helper route, allowing unauthenticated attackers to hijack interactive browser sessions.
Executive summary
An authentication bypass in OpenClaw allows unauthenticated attackers to gain unauthorized control over interactive browser sessions via the noVNC helper.
Vulnerability
The noVNC helper route fails to enforce bridge authentication. An attacker can access this route directly to view or control an active browser session.
Business impact
This vulnerability allows for the total compromise of an active browser session, potentially leading to the theft of session tokens, sensitive data, or the execution of malicious actions on behalf of the user. With a 9.8 CVSS score, the risk of unauthorized access is critical.
Remediation
Immediate Action: Update OpenClaw to version 2026.4.10 or later immediately.
Proactive Monitoring: Monitor access logs for the noVNC helper route and investigate any requests that do not originate from authorized bridge connections.
Compensating Controls: Implement strict firewall rules to restrict access to the noVNC helper route to trusted network segments only.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Securing the noVNC helper route is critical for preventing session hijacking. Organizations should apply the update promptly and verify that authentication mechanisms are functioning as expected.