CVE-2026-28485 - Vulnerability Analysis
HighCVSS: 8.4Last Updated: March 5, 2026
OpenClaw - Authentication Bypass
Overview
OpenClaw < 2026.2.12 contains a broken authentication caused by lack of mandatory authentication enforcement on /agent/act browser-control HTTP route, letting unauthorized local or network attackers execute privileged browser actions and access sensitive data, exploit requires local network or local process access.
Severity & Score
Impact
Unauthorized attackers can execute privileged browser actions and access sensitive session data, risking data exposure and control over browser context.
Mitigation
Upgrade to version 2026.2.12 or later.
References
Social Media Activity(1 post)
š CVE-2026-28485 - High (8.4) OpenClaw versions 2026.1.5 prior to 2026.2.12 fail to enforce mandatory authentication on the /agent/act browser-control HTTP route, allowing unauthorized local callers to invoke privileged operations. Remote attackers on the local network or loca... š https://www.thehackerwire.com/vulnerability/CVE-2026-28485/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-28485
- Severity
- High
- CVSS Score
- 8.4
- Type
- broken_authentication
- Status
- new
- EPSS
- 6.3%
- Social Posts
- 1
CWE
- CWE-306
CVSS Metrics
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H