CVE-2026-43581
OpenClaw · Sandbox Browser
OpenClaw contains an improper network binding configuration that exposes the Chrome DevTools Protocol externally, allowing unauthorized remote access.
Executive summary
An improper network binding in OpenClaw exposes the Chrome DevTools Protocol, granting attackers full control over the browser sandbox.
Vulnerability
The application binds the Chrome DevTools Protocol (CDP) relay to 0.0.0.0 instead of localhost. This allows unauthenticated remote attackers to connect to the relay and interact with the browser session.
Business impact
Exposing the DevTools protocol provides attackers with the ability to execute arbitrary code within the browser context, intercept data, and bypass local security boundaries. The 9.6 CVSS score underscores the significant risk of remote command execution and data exfiltration.
Remediation
Immediate Action: Update OpenClaw to version 2026.4.10 or later.
Proactive Monitoring: Scan for listening services on the ports associated with the CDP relay and verify that they are bound only to loopback interfaces.
Compensating Controls: Use network-level access control lists (ACLs) to block all external traffic to the DevTools port.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Immediate remediation is required to prevent unauthorized remote access to the browser sandbox environment. Ensure that the patch is applied across all instances and verify network configurations.