CVE-2026-25253: One-Click RCE in OpenClaw via Token Leakage and WebSocket Abuse

OpenClaw is an open-source, locally run autonomous AI assistant designed to act as a personal agent rather than a cloud-hosted service. Instead of routing prompts, context, and execution through a vendor-operated backend, OpenClaw runs directly on infrastructure chosen by the user, such as a laptop, homelab system, or virtual private server. Messaging integrations allow users to interact with the agent from familiar chat platforms while keeping execution local.

The project gained traction quickly after its initial release in late 2025, driven by interest in agent-style AI systems that can perform actions, invoke tools, and automate workflows without relying on SaaS control planes. OpenClaw exposes a local gateway and a browser-based Control UI that lets users manage configuration, approve actions, and define how tools execute. That design gives users flexibility and data ownership, but it also places a browser-facing interface directly in front of a privileged local service.


Overview of the Vulnerability

CVE-2026-25253 affects all OpenClaw releases prior to version 2026.1.29. The flaw stems from how the Control UI handles connection details passed through the browser. OpenClaw reads a gatewayUrl value directly from the query string and automatically initiates a WebSocket connection as soon as the page loads. During this process, a stored gateway authentication token is sent without user confirmation and without validating the origin of the request.

The CVE record was published on February 1, 2026, and later incorporated into the NVD dataset. MITRE, acting as the CNA, assigned a CVSS v3.1 base score of 8.8, reflecting high impact across confidentiality, integrity, and availability.


Impact and Exploitation Path

An attacker can exploit this behavior through a malicious link or website. When a logged-in user visits the page, client-side JavaScript can trigger a cross-site WebSocket hijacking attack. Since OpenClaw does not validate the WebSocket origin header, the local gateway accepts the connection even though it originates from an untrusted site.

Once the authentication token is captured, the attacker can connect back to the victim’s local OpenClaw gateway with operator-level access. That access allows configuration changes and the execution of commands through the API, resulting in remote code execution after a single click. Loopback-only bindings do not prevent this scenario, as the victim’s browser initiates the outbound connection on the attacker’s behal


Affected Deployments and Fix

Any OpenClaw or Moltbot deployment where a user has authenticated to the Control UI is affected. The issue was resolved in OpenClaw version 2026.1.29, released on January 30, 2026. Systems running older versions remain exposed.


Why This Exposure Matters

OpenClaw’s appeal rests on local control and data ownership. CVE-2026-25253 shows how browser-based management layers can weaken that security model if trust boundaries are not enforced. A local agent with broad execution capabilities becomes a high-value target once a web interface can be coerced into handing over credentials. Updating to the fixed release is the minimum step required to close off this attack path.


How Can Netizen Help?

Founded in 2013, Netizen is an award-winning technology firm that develops and leverages cutting-edge solutions to create a more secure, integrated, and automated digital environment for government, defense, and commercial clients worldwide. Our innovative solutions transform complex cybersecurity and technology challenges into strategic advantages by delivering mission-critical capabilities that safeguard and optimize clients’ digital infrastructure. One example of this is our popular “CISO-as-a-Service” offering that enables organizations of any size to access executive level cybersecurity expertise at a fraction of the cost of hiring internally. 

Netizen also operates a state-of-the-art 24x7x365 Security Operations Center (SOC) that delivers comprehensive cybersecurity monitoring solutions for defense, government, and commercial clients. Our service portfolio includes cybersecurity assessments and advisory, hosted SIEM and EDR/XDR solutions, software assurance, penetration testing, cybersecurity engineering, and compliance audit support. We specialize in serving organizations that operate within some of the world’s most highly sensitive and tightly regulated environments where unwavering security, strict compliance, technical excellence, and operational maturity are non-negotiable requirements. Our proven track record in these domains positions us as the premier trusted partner for organizations where technology reliability and security cannot be compromised.

Netizen holds ISO 27001, ISO 9001, ISO 20000-1, and CMMI Level III SVC registrations demonstrating the maturity of our operations. We are a proud Service-Disabled Veteran-Owned Small Business (SDVOSB) certified by U.S. Small Business Administration (SBA) that has been named multiple times to the Inc. 5000 and Vet 100 lists of the most successful and fastest-growing private companies in the nation. Netizen has also been named a national “Best Workplace” by Inc. Magazine, a multiple awardee of the U.S. Department of Labor HIRE Vets Platinum Medallion for veteran hiring and retention, the Lehigh Valley Business of the Year and Veteran-Owned Business of the Year, and the recipient of dozens of other awards and accolades for innovation, community support, working environment, and growth.

Looking for expert guidance to secure, automate, and streamline your IT infrastructure and operations? Start the conversation today.


Posted in , , , ,

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.