Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-43575 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: OpenClaw's sandbox noVNC helper route lacks proper auth checks. <br>πŸ’₯ **Consequences**: Attackers bypass bridge auth to access interactive browser sessions. Credentials are exposed.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-862**: Missing Authorization. <br>πŸ” **Flaw**: The noVNC helper route does not verify user identity before granting access. It trusts the request blindly.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Vendor**: OpenClaw. <br>πŸ“‰ **Affected**: Versions **before 2026.4.10**. <br>⚠️ **Includes**: Version 2026.2.21 and all prior releases.

Q4What can hackers do? (Privileges/Data)

πŸ‘€ **Privileges**: Unauthorized access to sandboxed browser sessions. <br>πŸ“‚ **Data**: Full visibility of interactive browser UI. Potential credential theft from exposed sessions.

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **LOW**. <br>πŸ”‘ **Auth**: None required. <br>🌐 **Config**: Network accessible (AV:N). No user interaction needed (UI:N). Easy remote exploitation.

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exp**: No PoC listed in data. <br>🌍 **Wild Exp**: Unconfirmed. <br>πŸ“ **Note**: VulnCheck advisory exists, but code-level exploit is not public yet.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for OpenClaw instances. <br>πŸ§ͺ **Test**: Attempt direct access to noVNC helper routes without authentication tokens. <br>πŸ“Š **Indicator**: Look for version strings < 2026.4.10.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. <br>πŸ”§ **Patch**: Version **2026.4.10** or later. <br>πŸ”— **Ref**: GitHub Security Advisory GHSA-92jp-89mq-4374. Commit 8dfbf32 fixes it.

Q9What if no patch? (Workaround)

πŸ›‘ **Workaround**: Isolate the sandbox network. <br>🚫 **Block**: Restrict access to noVNC helper routes via firewall/WAF. <br>πŸ‘€ **Monitor**: Alert on unauthorized access attempts to these endpoints.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: **CRITICAL**. <br>πŸ“ˆ **CVSS**: 9.1 (High). <br>⚑ **Action**: Patch immediately. Low barrier to entry + high impact (full session compromise) = urgent remediation needed.