OpenClaw: OpenClaw Vulnerability Exposes How an Open-Source AI Agent Can Be Hijacked

OpenClaw: OpenClaw Vulnerability Exposes How an Open-Source AI Agent Can Be Hijacked

OpenClaw AI Agent’s Rapid Rise Marred by Critical Vulnerability

OpenClaw, an open-source AI agent designed to function as a local personal assistant, achieved unprecedented growth in February, amassing over 100,000 GitHub stars in just five days one of the fastest ascents for an AI tool in history. Developed by Peter Steinberger (later recruited by OpenAI), the project promised autonomy, allowing users to manage workflows, execute system commands, and integrate with messaging platforms via a self-hosted agent. Its popularity surged among developers, with OpenAI CEO Sam Altman praising Steinberger’s vision for "very smart agents" following his hiring on February 15.

However, beneath its rapid adoption lay a severe security flaw. Researchers at Oasis Security uncovered a vulnerability chain in OpenClaw’s core architecture that enabled malicious websites to silently hijack the agent without user interaction, plugins, or marketplace downloads. The flaw resided in the tool’s local WebSocket gateway, which manages authentication and orchestrates connected nodes (e.g., macOS/iOS devices). By default, the gateway bound to localhost, assuming local access was inherently trusted a critical oversight.

The attack exploited two key weaknesses: browsers’ lack of cross-origin restrictions for WebSocket connections to localhost, and the gateway’s exemption of localhost connections from rate limiting. A malicious site could use JavaScript to establish a WebSocket connection, brute-force the agent’s password (often guessed in seconds), and gain full administrative access. Once authenticated, attackers could register rogue devices, extract sensitive data (e.g., Slack messages, API keys), or execute arbitrary commands on connected systems. The vulnerability, classified as "High" severity, required no user interaction beyond visiting a compromised webpage.

The OpenClaw team patched the flaw within 24 hours, releasing version 2026.2.25. The incident followed an earlier discovery of over 1,000 malicious "skills" in OpenClaw’s community marketplace, ClawHub, which distributed info-stealing malware a separate supply-chain attack. Unlike those threats, the WebSocket vulnerability was embedded in OpenClaw’s core, underscoring risks in shadow AI adoption: developers often deploy such tools without IT oversight, granting them deep system access.

The episode highlights broader challenges in securing autonomous AI agents. While OpenClaw’s patch mitigated the immediate risk, the incident serves as a case study for the governance gaps in rapidly proliferating open-source AI tools. Organizations are now grappling with visibility into these agents, which operate with credentials, permissions, and autonomy akin to human users yet lack centralized controls. The vulnerability’s discovery reinforces the need for intent-based guardrails, audit trails, and structured oversight as AI agents become integral to developer workflows.

Source: https://thecyberexpress.com/openclaw-vulnerability-open-source-ai-takeover/

OpenClaw cybersecurity rating report: https://www.rankiteo.com/company/openclawai

"id": "OPE1772180865",
"linkid": "openclawai",
"type": "Vulnerability",
"date": "2/2026",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': 'Developers and organizations '
                                              'using OpenClaw',
                        'industry': 'Artificial Intelligence/Software '
                                    'Development',
                        'location': 'Global (self-hosted)',
                        'name': 'OpenClaw AI Agent',
                        'size': '100,000+ GitHub stars (user base)',
                        'type': 'Open-Source AI Tool'}],
 'attack_vector': 'WebSocket Connection Hijacking',
 'data_breach': {'data_exfiltration': 'Yes',
                 'personally_identifiable_information': 'Yes',
                 'sensitivity_of_data': 'High',
                 'type_of_data_compromised': ['Slack messages',
                                              'API keys',
                                              'Personally Identifiable '
                                              'Information (PII)']},
 'date_detected': '2026-02-25',
 'date_resolved': '2026-02-25',
 'description': 'OpenClaw, an open-source AI agent, was found to have a severe '
                'security flaw in its core architecture that allowed malicious '
                'websites to hijack the agent without user interaction. The '
                "vulnerability exploited the local WebSocket gateway's binding "
                'to *localhost* and lack of rate limiting for localhost '
                'connections, enabling attackers to brute-force passwords and '
                'gain full administrative access.',
 'impact': {'brand_reputation_impact': 'High (rapid adoption followed by '
                                       'critical vulnerability)',
            'data_compromised': 'Sensitive data (e.g., Slack messages, API '
                                'keys)',
            'identity_theft_risk': 'High (PII exposure risk)',
            'operational_impact': 'Unauthorized command execution, data '
                                  'extraction',
            'systems_affected': 'OpenClaw AI Agent (self-hosted instances)'},
 'investigation_status': 'Resolved',
 'lessons_learned': 'The incident highlights risks in shadow AI adoption, '
                    'where tools are deployed without IT oversight. It '
                    'underscores the need for intent-based guardrails, audit '
                    'trails, and structured oversight for autonomous AI '
                    'agents.',
 'post_incident_analysis': {'corrective_actions': ['Patched WebSocket gateway '
                                                   'authentication',
                                                   'Implemented rate limiting '
                                                   'for localhost connections',
                                                   'Released version 2026.2.25 '
                                                   'with fixes'],
                            'root_causes': ['Local WebSocket gateway bound to '
                                            '*localhost* with implicit trust',
                                            'Lack of cross-origin restrictions '
                                            'for WebSocket connections to '
                                            '*localhost*',
                                            'Exemption of localhost '
                                            'connections from rate limiting',
                                            'Weak password policies for agent '
                                            'authentication']},
 'recommendations': ['Implement intent-based guardrails for AI agents',
                     'Enforce centralized controls and audit trails',
                     'Improve visibility into self-hosted AI tools',
                     'Strengthen authentication mechanisms for local services',
                     'Educate developers on secure deployment practices'],
 'references': [{'source': 'Oasis Security Research'}],
 'response': {'containment_measures': 'Patch released (version 2026.2.25)',
              'incident_response_plan_activated': 'Yes (24-hour patch release)',
              'remediation_measures': 'Fixed WebSocket gateway authentication '
                                      'and rate limiting',
              'third_party_assistance': 'Oasis Security (vulnerability '
                                        'researchers)'},
 'title': 'OpenClaw AI Agent WebSocket Vulnerability Exploit',
 'type': 'Vulnerability Exploitation',
 'vulnerability_exploited': 'CVE-2026-XXXXX (Local WebSocket Gateway '
                            'Authentication Bypass)'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.