GHSA-cmfr-9m2r-xwhq: OpenClaw: auth bypass enables persistent browser profile mutation
GHSA-cmfr-9m2r-xwhq MEDIUMOpenClaw's browser proxy invocation path (`node.invoke(browser.proxy)`) bypasses the `browser.request` authorization guard designed to prevent persistent browser profile mutations, classified as CWE-863 Incorrect Authorization. While scoped to a local, user-controlled assistant context and carrying no EPSS data or KEV listing, the risk is non-trivial: persistent profile mutation can survive session restarts, potentially altering proxy settings, injecting stored credentials, or redirecting traffic — all silently. The same OpenClaw ecosystem has logged 60 CVEs total and was linked to a Feb. 2026 incident where malicious skills delivered AMOS stealer and exfiltrated credentials (AIID #1368), confirming it is an active adversarial target. Upgrade to openclaw 2026.4.8 immediately; no workaround exists for the guard bypass.
Risk Assessment
Medium risk in isolation, elevated in context. The local-agent trust model limits multi-tenant blast radius, but persistent browser profile mutation creates a durable foothold in any workflow where OpenClaw manages browser sessions. No public exploit code or scanner template is available, and exploitation requires access to the agent's invocation surface. However, the package's history of 60 CVEs and confirmed ecosystem abuse (AMOS stealer distribution) raises the operational risk above the base CVSS score suggests.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| openclaw | npm | < 2026.4.8 | 2026.4.8 |
Do you use openclaw? You're affected.
Severity & Risk
Recommended Action
- Upgrade to openclaw 2026.4.8 immediately — this is the only fix; no workaround exists for the path bypass.
- Audit existing browser profiles managed by OpenClaw for unexpected proxy settings, extension changes, or modified credential stores.
- If upgrade is not immediately possible, restrict OpenClaw's invocation surface to trusted internal callers only.
- Review installed OpenClaw skills against known-good baselines — given the AMOS stealer incident, treat all third-party skills as untrusted until verified.
- Monitor filesystem changes to browser profile directories as a detection signal for exploitation.
Classification
Compliance Impact
This CVE is relevant to:
Related AI Incidents (1)
Source: AI Incident Database (AIID)
Frequently Asked Questions
What is GHSA-cmfr-9m2r-xwhq?
OpenClaw's browser proxy invocation path (`node.invoke(browser.proxy)`) bypasses the `browser.request` authorization guard designed to prevent persistent browser profile mutations, classified as CWE-863 Incorrect Authorization. While scoped to a local, user-controlled assistant context and carrying no EPSS data or KEV listing, the risk is non-trivial: persistent profile mutation can survive session restarts, potentially altering proxy settings, injecting stored credentials, or redirecting traffic — all silently. The same OpenClaw ecosystem has logged 60 CVEs total and was linked to a Feb. 2026 incident where malicious skills delivered AMOS stealer and exfiltrated credentials (AIID #1368), confirming it is an active adversarial target. Upgrade to openclaw 2026.4.8 immediately; no workaround exists for the guard bypass.
Is GHSA-cmfr-9m2r-xwhq actively exploited?
No confirmed active exploitation of GHSA-cmfr-9m2r-xwhq has been reported, but organizations should still patch proactively.
How to fix GHSA-cmfr-9m2r-xwhq?
1. Upgrade to openclaw 2026.4.8 immediately — this is the only fix; no workaround exists for the path bypass. 2. Audit existing browser profiles managed by OpenClaw for unexpected proxy settings, extension changes, or modified credential stores. 3. If upgrade is not immediately possible, restrict OpenClaw's invocation surface to trusted internal callers only. 4. Review installed OpenClaw skills against known-good baselines — given the AMOS stealer incident, treat all third-party skills as untrusted until verified. 5. Monitor filesystem changes to browser profile directories as a detection signal for exploitation.
What systems are affected by GHSA-cmfr-9m2r-xwhq?
This vulnerability affects the following AI/ML architecture patterns: agent frameworks, browser automation, local AI agents.
What is the CVSS score for GHSA-cmfr-9m2r-xwhq?
No CVSS score has been assigned yet.
Technical Details
NVD Description
## Impact OpenClaw `node.invoke(browser.proxy)` bypasses `browser.request` persistent profile-mutation guard. node.invoke(browser.proxy) could mutate persistent browser profiles through a path that bypassed the browser.request guard. OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenant service boundary. ## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `<= v2026.04.01` - Patched versions: `2026.4.8` ## Fix The issue was fixed on `main` and is available in the patched npm version listed above. The verified fixed tree is commit `d7c3210cd6f5fdfdc1beff4c9541673e814354d5`. ## Verification The fix was re-checked against `main` before publication, including targeted regression tests for the affected security boundary. ## Credits Thanks @nicky-cc of Tencent zhuque Lab ([https://github.com/Tencent/AI-Infra-Guard](https://github.com/Tencent/AI-Infra-Guard)) for reporting.
Exploitation Scenario
An attacker who controls a malicious OpenClaw skill (or has code execution in the agent's environment) calls `node.invoke(browser.proxy)` instead of routing through the protected `browser.request` path. This bypasses the persistent-profile-mutation guard, allowing the attacker to reconfigure the browser's proxy to an adversary-controlled endpoint. All subsequent web requests made by OpenClaw — including authenticated API calls, credential submissions, or session-bearing requests — are then transparently intercepted. The mutation persists across OpenClaw restarts, creating a durable interception channel that survives normal session cleanup. This attack chain mirrors exactly the credential exfiltration vector observed in AIID #1368.
Weaknesses (CWE)
References
Timeline
Related Vulnerabilities
CVE-2026-30741 9.8 OpenClaw: RCE via request-side prompt injection
Same package: openclaw CVE-2026-28451 9.3 OpenClaw: SSRF via Feishu extension exposes internal services
Same package: openclaw GHSA-m3mh-3mpg-37hw 8.6 OpenClaw: .npmrc hijack enables RCE on plugin install
Same package: openclaw CVE-2026-27001 7.8 OpenClaw: prompt injection via unsanitized workspace path
Same package: openclaw GHSA-hr5v-j9h9-xjhg 7.7 OpenClaw: sandbox escape via mediaUrl path traversal
Same package: openclaw
AI Threat Alert