Security Flaw in ClawJacked Allows Malicious Sites to Hijack Local OpenClaw AI Agents via WebSocket

Published:

spot_img

OpenClaw Security Vulnerabilities: What You Need to Know

OpenClaw recently addressed a critical security vulnerability that, if exploited, could have permitted a malicious website to gain unauthorized access to a locally running AI agent. This issue, identified by Oasis Security and dubbed “ClawJacked,” highlighted significant concerns regarding the core functionality of the OpenClaw system.

Understanding the Vulnerability

The vulnerability exists within the fundamental framework of OpenClaw—no third-party plugins or extensions were involved. According to Oasis Security, the flaw resides in the OpenClaw gateway, a local WebSocket server that is typically bound to localhost and secured with a password. The attack vector activates when a user visits an attacker-controlled site through social engineering or other manipulative approaches.

How the Attack Works

The attack unfolds in a series of steps that illustrate the seamless nature of the threat:

  1. Malicious JavaScript Activation: The attack begins when harmful JavaScript on a visiting web page opens a WebSocket connection to the local OpenClaw gateway port.

  2. Brute-Force Password Access: The script then exploits a lack of rate-limiting to attempt to brute-force the gateway’s password.

  3. Unauthorized Device Registration: Once authenticated, the script auto-registers itself as a trusted device, a process that the OpenClaw gateway accepts without user intervention.

  4. Full Control: This sequence grants the attacker comprehensive control over the AI agent, enabling them to access configuration data, enumerate connected nodes, and read application logs.

As Oasis Security noted, browsers do not block such cross-origin connections, allowing JavaScript from the visited site to connect to localhost without the user being aware.

Immediate Response and Action Steps

OpenClaw responded swiftly to the situation, rolling out a fix within 24 hours via version 2026.2.25, released on February 26, 2026. Users are strongly encouraged to update to the latest version immediately. Additionally, they should periodically review permissions granted to AI agents and put in place governance measures to manage non-human identities effectively.

Broader Security Concerns

This vulnerability emerges amid a heightened focus on the security landscape surrounding OpenClaw, mainly due to the vital role AI agents play within enterprise systems. These agents often have extensive access privileges, increasing the risk profile significantly if they are compromised.

Research from Bitsight and NeuralTrust has indicated that OpenClaw instances exposed to the Internet represent an enlarged attack surface. Each integrated service can broaden potential vulnerabilities, with risk escalation occurring through techniques like embedding malicious prompt injections within email or Slack messages processed by AI agents.

Additional Vulnerabilities and Addressed Issues

In the same reporting period, OpenClaw also addressed a log poisoning vulnerability. This issue allowed attackers to inject malicious content into log files via WebSocket requests directed at publicly accessible instances. When AI agents read their logs for troubleshooting, they could inadvertently execute malicious commands embedded within those logs.

Recent research revealed that OpenClaw is becoming a breeding ground for various vulnerabilities, with serious issues (CVE-2026-25593, CVE-2026-24763, among others) ranging from remote code execution to command injection. OpenClaw’s updates have addressed these vulnerabilities through multiple releases.

As AI frameworks become commonplace in business environments, experts emphasize the need for evolving security assessments to account for both conventional weaknesses and those unique to AI technologies.

Malicious Activities on ClawHub

Additionally, reports indicate concerning trends on ClawHub, an open marketplace for OpenClaw skills. Malicious scripts are being used to deliver harmful payloads, including a macOS information stealer known as Atomic Stealer. Analysts have challenged users to exercise caution, especially regarding skills that appear innocuous but can lead to harmful outcomes.

For instance, certain uploads designed to look benign had hidden functionalities that redirected cryptocurrency transactions to wallets controlled by malicious actors. Others aimed to manipulate AI agents into making unsolicited modifications or executing harmful commands, raising alarms about the integrity of the entire ecosystem.

Conclusion: Cautious Engagement Needed

Given the recent incidents and findings, it’s crucial for OpenClaw users to maintain vigilance. Regular audits of installed skills, avoiding unnecessary credential sharing, and closely monitoring skill performance are key steps users should adopt. As emphasized by Microsoft, employing OpenClaw within an unguarded environment poses significant risks, necessitating careful management to avoid exposure and compromise.

For organizations looking to assess OpenClaw, it is advisable to consider isolated environments strictly for testing while following strict security protocols to safeguard sensitive data. Continuous monitoring and preparedness are essential in maintaining security integrity.

spot_img

Related articles

Recent articles

Iran-Linked Handala Hack Team Compromises FBI Director Kash Patel’s Email, Exposes Historical Data

Iran-Linked Handala Hack Team Compromises FBI Director Kash Patel's Email, Exposes Historical Data In a significant breach of cybersecurity, the personal email account of Kash...

Leak Bazaar: The Underground Marketplace Transforming Stolen Data into Profitable Intelligence Products

Leak Bazaar: The Underground Marketplace Transforming Stolen Data into Profitable Intelligence Products Cybercrime has transitioned from mere data theft to a sophisticated, profit-driven enterprise. At...

^NDX Today, March 28: Iran-Linked FBI Hack Accelerates Cybersecurity Investment

^NDX Today, March 28: Iran-Linked FBI Hack Accelerates Cybersecurity Investment The recent breach involving Kash Patel, the FBI director, has drawn significant attention from UK...

Markaz Launches “iMarkaz Invest” to Strengthen Digital Investment Experience Across Kuwait, Saudi Arabia, UAE, and US

Markaz Launches “iMarkaz Invest” to Strengthen Digital Investment Experience Across Kuwait, Saudi Arabia, UAE, and US Kuwait Financial Centre “Markaz” has unveiled “iMarkaz Invest,” a...