Vulnerability Description
OpenClaw versions 2026.2.21 before 2026.4.10 contain an authentication bypass vulnerability in the sandbox noVNC helper route that exposes interactive browser session credentials. Attackers can access the noVNC helper route without bridge authentication to gain unauthorized access to the interactive browser session.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openclaw | Openclaw | >= 2026.2.21, < 2026.4.10 |
Related Weaknesses (CWE)
References
- https://github.com/openclaw/openclaw/commit/8dfbf3268bd224b7377d1ecca77a44510074Patch
- https://github.com/openclaw/openclaw/security/advisories/GHSA-92jp-89mq-4374MitigationVendor Advisory
- https://www.vulncheck.com/advisories/openclaw-authentication-bypass-in-sandbox-nThird Party Advisory
FAQ
What is CVE-2026-43575?
CVE-2026-43575 is a vulnerability with a CVSS score of 9.8 (CRITICAL). OpenClaw versions 2026.2.21 before 2026.4.10 contain an authentication bypass vulnerability in the sandbox noVNC helper route that exposes interactive browser session credentials. Attackers can access...
How severe is CVE-2026-43575?
CVE-2026-43575 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-43575?
Check the references section above for vendor advisories and patch information. Affected products include: Openclaw Openclaw.