CVE-2026-43575
OpenClaw versions 2026.2.21 before 2026.4.10 contain an authentication bypass vulnerability in the sandbox noVNC helper route that exposes interactive browser session credentials. Attackers can access the noVNC helper route without bridge authentication to gain unauthorized access to the interactive browser session.
Ver en NVDAnálisis
OpenClaw appears to be a specialized tool for browser sandboxing and VNC-based testing environments. While the CVSS score is critical due to a pre-authentication bypass that exposes session credentials, the software lacks the widespread deployment in the common MexicoDev stack to justify a general alert.
Severidad
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HCWE-862EPSS
Sin puntaje EPSS aún (CVE muy reciente).
Descripción técnica
OpenClaw versions 2026.2.21 before 2026.4.10 contain an authentication bypass vulnerability in the sandbox noVNC helper route that exposes interactive browser session credentials. Attackers can access the noVNC helper route without bridge authentication to gain unauthorized access to the interactive browser session.