CVE-2026-28485
Received Received - Intake
Authentication Bypass in OpenClaw /agent/act Enables Privileged Access

Publication date: 2026-03-05

Last updated on: 2026-03-11

Assigner: VulnCheck

Description
OpenClaw versions 2026.1.5 prior to 2026.2.12 fail to enforce mandatory authentication on the /agent/act browser-control HTTP route, allowing unauthorized local callers to invoke privileged operations. Remote attackers on the local network or local processes can execute arbitrary browser-context actions and access sensitive in-session data by sending requests to unauthenticated endpoints.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-05
Last Modified
2026-03-11
Generated
2026-05-07
AI Q&A
2026-03-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
openclaw openclaw to 2026.1.5 (inc)
openclaw openclaw From 2026.2.9 (inc) to 2026.2.12 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in OpenClaw versions 2026.1.5 prior to 2026.2.12, where mandatory authentication is not enforced on the /agent/act browser-control HTTP route.

Because of this, unauthorized local callers can invoke privileged operations without authentication.

Remote attackers on the local network or local processes can send requests to these unauthenticated endpoints to execute arbitrary browser-context actions and access sensitive in-session data.


How can this vulnerability impact me? :

This vulnerability can allow attackers who have local network access or local process access to execute privileged operations without authorization.

Attackers can perform arbitrary actions within the browser context and access sensitive data from active sessions.

This could lead to unauthorized data exposure, manipulation of browser sessions, and potential compromise of system integrity.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart