PT-2026-5584 · Openclaw · Openclaw
0Xacb
+2
·
Published
2026-01-31
·
Updated
2026-02-17
·
CVE-2026-25253
CVSS v2.0
10
10
High
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
OpenClaw versions prior to 2026.1.29
Description
OpenClaw, formerly known as Clawdbot and Moltbot, is vulnerable to a critical remote code execution (RCE) vulnerability, tracked as CVE-2026-25253. This flaw allows attackers to steal authentication tokens via a crafted URL, enabling them to hijack user sessions and potentially gain full control of the system. The vulnerability stems from improper validation of the
gatewayUrl parameter, which allows attackers to initiate a WebSocket connection and exfiltrate sensitive data. Exploitation can occur with a single click on a malicious link. Over 17,500 instances were found exposed, and the vulnerability has been actively exploited in the wild. The vulnerability allows attackers to bypass security measures and potentially gain full system access. The issue has been addressed in version 2026.1.29.Recommendations
OpenClaw versions prior to 2026.1.29 are vulnerable. Upgrade to version 2026.1.29 or later immediately to mitigate this critical risk. Rotate all exposed authentication tokens. Implement robust security measures, including restricting external access, deploying Web Application Firewalls (WAFs) to block malicious URLs, and enforcing strict egress filtering. Consider running OpenClaw in a sandboxed environment to limit the potential impact of exploitation.
Exploit
Fix
RCE
Exposure of Resource to Wrong Sphere
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2026-01840
CVE-2026-25253
GHSA-G8P2-7WF7-98MQ
GHSA-R2C6-8JC8-G32W
Affected Products
Openclaw
References · 160
- 🔥 https://x.com/0xacb/status/2016913750557651228 · Exploit
- 🔥 https://depthfirst.com/post/1-click-rce-to-steal-your-moltbot-data-and-keys · Exploit
- 🔥 https://ethiack.com/news/blog/one-click-rce-moltbot · Exploit
- https://github.com/openclaw/openclaw/security/advisories/GHSA-g8p2-7wf7-98mq⭐ 141432 🔗 21037 · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2026-25253 · Vendor Advisory
- https://osv.dev/vulnerability/GHSA-r2c6-8jc8-g32w · Vendor Advisory
- https://osv.dev/vulnerability/GHSA-g8p2-7wf7-98mq · Vendor Advisory
- https://bdu.fstec.ru/vul/2026-01840 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2026-25253 · Security Note
- https://github.com/openclaw/openclaw⭐ 167088 🔗 26555 · Note
- https://github.com/adibirzu/openclaw-security-monitor⭐ 4 · Note
- https://twitter.com/PirouneB/status/2020548330930008570 · Twitter Post
- https://twitter.com/hi_im_six/status/2020614367507566711 · Twitter Post
- https://twitter.com/modat_magnify/status/2018717137674641665 · Twitter Post
- https://reddit.com/r/pwnhub/comments/1qu2svg/highrisk_openclaw_bug_exposes_users_to_oneclick · Reddit Post