CVE-2026-43581

OpenClaw · Sandbox Browser

OpenClaw contains an improper network binding configuration that exposes the Chrome DevTools Protocol externally, allowing unauthorized remote access.

Executive summary

An improper network binding in OpenClaw exposes the Chrome DevTools Protocol, granting attackers full control over the browser sandbox.

Vulnerability

The application binds the Chrome DevTools Protocol (CDP) relay to 0.0.0.0 instead of localhost. This allows unauthenticated remote attackers to connect to the relay and interact with the browser session.

Business impact

Exposing the DevTools protocol provides attackers with the ability to execute arbitrary code within the browser context, intercept data, and bypass local security boundaries. The 9.6 CVSS score underscores the significant risk of remote command execution and data exfiltration.

Remediation

Immediate Action: Update OpenClaw to version 2026.4.10 or later.

Proactive Monitoring: Scan for listening services on the ports associated with the CDP relay and verify that they are bound only to loopback interfaces.

Compensating Controls: Use network-level access control lists (ACLs) to block all external traffic to the DevTools port.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Immediate remediation is required to prevent unauthorized remote access to the browser sandbox environment. Ensure that the patch is applied across all instances and verify network configurations.