Cyber Posture

CVE-2026-28395

MediumPublic PoC

Published: 05 March 2026

Published
05 March 2026
Modified
09 March 2026
KEV Added
Patch
CVSS Score 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
EPSS Score 0.0020 41.2th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Description

OpenClaw version 2026.1.14-1 prior to 2026.2.12 contain an improper network binding vulnerability in the Chrome extension (must be installed and enabled) relay server that treats wildcard hosts as loopback addresses, allowing the relay HTTP/WS server to bind to all interfaces…

more

when a wildcard cdpUrl is configured. Remote attackers can access relay HTTP endpoints off-host to leak service presence and port information, or conduct denial-of-service and brute-force attacks against the relay token header.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the improper network binding flaw by requiring timely identification, reporting, and correction through patching to the fixed OpenClaw version 2026.2.12.

prevent

Prevents remote attackers from accessing exposed relay HTTP/WS endpoints by monitoring and controlling communications at system boundaries.

prevent

Mitigates misconfiguration risks by establishing and enforcing secure configuration settings that restrict network service bindings to loopback interfaces.

Security SummaryAI

CVE-2026-28395 is an improper network binding vulnerability (CWE-1327) affecting OpenClaw versions 2026.1.14-1 prior to 2026.2.12. The issue resides in the relay server of the Chrome extension, which must be installed and enabled. Specifically, the server incorrectly treats wildcard hosts as loopback addresses, causing the HTTP/WS relay server to bind to all network interfaces when a wildcard cdpUrl is configured. This has a CVSS v3.1 base score of 6.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L).

Remote attackers can exploit this vulnerability without privileges by accessing the relay HTTP endpoints from off-host networks. Successful exploitation enables detection of the service's presence and exposed ports, partial information disclosure via leaked service details, denial-of-service attacks against the relay, and brute-force attempts on the relay token header.

Advisories and patch notes, including GitHub security advisory GHSA-qw99-grcx-4pvm and commits 8d75a496bf5aaab1755c56cf48502d967c75a1d0 and a1e89afcc19efd641c02b24d66d689f181ae2b5c, recommend upgrading to OpenClaw version 2026.2.12 or later, where the binding logic is fixed to properly restrict wildcard configurations to loopback interfaces only. The VulnCheck advisory further details the unintended public binding via wildcard cdpUrl.

Details

CWE(s)

Affected Products

openclaw
openclaw
2026.1.14-1 — 2026.2.12

MITRE ATT&CK Enterprise TechniquesAI

T1046 Network Service Discovery Discovery
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
T1110 Brute Force Credential Access
Adversaries may use brute force techniques to gain access to accounts when passwords are unknown or when password hashes are obtained.
T1499 Endpoint Denial of Service Impact
Adversaries may perform Endpoint Denial of Service (DoS) attacks to degrade or block the availability of services to users.
Why these techniques?

Vulnerability exposes relay server to remote access (PR:N), directly enabling network service discovery through detection of presence/ports (T1046), brute-force on relay token header (T1110), and denial-of-service against the relay (T1499).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References