CVE ReportsOpenClaw, Open Door: When 0.0.0.0 Equals Localhost Vulnerability ID:...
Vulnerability ID: GHSA-QW99-GRCX-4PVM
CVSS Score: 9.8
Published: 2026-02-17
OpenClaw (formerly Clawdbot), a personal AI assistant, contained a critical network binding vulnerability where the application incorrectly treated wildcard IP addresses (0.0.0.0) as loopback addresses. This allowed the sensitive Chrome extension relay service—intended only for local communication—to be exposed to the entire network, granting remote attackers control over the victim's browser via the Chrome DevTools Protocol.
OpenClaw's code thought '0.0.0.0' was a safe loopback address. It wasn't. This logic error exposed the Chrome DevTools Protocol to the network, allowing remote attackers to hijack browsers and steal credentials.
2026.2.12)Fix: correctly identify loopback addresses vs wildcard bindings
- h === "0.0.0.0" ||
+ // Removed 0.0.0.0 from loopback check
Remediation Steps:
Read the full report for GHSA-QW99-GRCX-4PVM on our website for more details including interactive diagrams and full exploit analysis.