Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Researchers discover 341 malicious ClawHub skills that steal data from OpenClaw users

OpenClaw bug allows one-click remote code execution via malicious link

Microsoft begins phasing out NTLM with three-phase plan to migrate Windows to Kerberos

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » OpenClaw bug allows one-click remote code execution via malicious link
Identity

OpenClaw bug allows one-click remote code execution via malicious link

userBy userFebruary 2, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 2, 2026Vulnerability / Artificial Intelligence

A high-severity security flaw has been disclosed in OpenClaw (previously known as Clawdbot and Moltbot) that could allow remote code execution (RCE) via a crafted malicious link.

This issue is tracked as CVE-2026-25253 (CVSS score: 8.8) and is resolved in version 2026.1.29, released on January 30, 2026. The issue is described as a token extraction vulnerability that could lead to a compromise of the entire gateway.

“The Control UI will trust the gatewayUrl from the query string without validation, auto-connect on load, and send the stored gateway token to the WebSocket connection payload,” OpenClaw creator and maintainer Peter Steinberger said in the advisory.

cyber security

“Clicking on a crafted link or visiting a malicious site can send a token to an attacker-controlled server. The attacker can then connect to the victim’s local gateway, modify settings (sandbox, tool policies), and invoke privileged actions to achieve one-click RCE.”

OpenClaw is an open-source, autonomous artificial intelligence (AI) personal assistant that runs locally on the user’s device and integrates with a wide range of messaging platforms. The project was first released in November 2025, but has rapidly gained popularity in recent weeks, with the GitHub repository having over 149,000 stars at the time of writing.

“OpenClaw is an open agent platform that runs on your machine and works from the chat apps you already use,” Steinberger said. “Unlike SaaS assistants, where your data resides on someone else’s server, OpenClaw runs wherever you choose, whether it’s on your laptop, home lab, or VPS. Your infrastructure, keys, and data.”

Security researcher Mab Levin, founder of DepthFirst, who is credited with discovering the flaw, said the vulnerability could be exploited to create a one-click RCE exploit chain in just milliseconds after a victim visits a single malicious web page.

The problem is that OpenClaw’s servers do not validate WebSocket origin headers, so simply clicking a link to that webpage is enough to trigger a cross-site WebSocket hijacking attack. This allows the server to accept requests from any website, effectively bypassing localhost’s network limitations.

A malicious web page could use this issue to execute client-side JavaScript on the victim’s browser, obtain an authentication token, establish a WebSocket connection to the server, and use the stolen token to bypass authentication and log into the victim’s OpenClaw instance.

Worse yet, by leveraging the token’s privileged scopes operator.admin and operator.approvals, an attacker can use the API to disable user verification by setting “exec.approvals.set” to “off” and escape the container used to run shell tools by setting “tools.exec.host” to “gateway”.

cyber security

“This forces the agent to run commands directly on the host machine, rather than inside a Docker container,” Levin says. “Finally, to execute arbitrary commands, the attacker’s JavaScript performs a node.invoke request.”

“Because the victim’s browser initiates the outbound connection, this vulnerability is exploitable even in instances configured to listen on loopback only,” Steinberger wrote in the advisory.

“This affects all Moltbot deployments where the user is authenticated to the control UI. The attacker gains operator-level access to the Gateway API, allowing them to make arbitrary configuration changes or execute code on the Gateway host. The victim’s browser acts as a bridge, so the attack works even if the Gateway is bound to loopback.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMicrosoft begins phasing out NTLM with three-phase plan to migrate Windows to Kerberos
Next Article Researchers discover 341 malicious ClawHub skills that steal data from OpenClaw users
user
  • Website

Related Posts

Researchers discover 341 malicious ClawHub skills that steal data from OpenClaw users

February 2, 2026

Microsoft begins phasing out NTLM with three-phase plan to migrate Windows to Kerberos

February 2, 2026

Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats

February 2, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Researchers discover 341 malicious ClawHub skills that steal data from OpenClaw users

OpenClaw bug allows one-click remote code execution via malicious link

Microsoft begins phasing out NTLM with three-phase plan to migrate Windows to Kerberos

Ring offers “Search Party” feature to help non-Ring camera owners find lost dogs

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.