ClawJacked Flaw in OpenClaw Enables Local AI Agent Hijacking via WebSocket
Summary
Hide ▲
Show ▼
A high-severity vulnerability in OpenClaw, codenamed ClawJacked, allows malicious websites to hijack locally running AI agents through WebSocket connections. The flaw exploits missing rate-limiting and auto-approval of trusted devices, enabling attackers to take control of the AI agent. OpenClaw has released a fix in version 2026.2.25, urging users to update immediately and enforce strict governance controls. The vulnerability is caused by the OpenClaw gateway service binding to localhost by default and exposing a WebSocket interface, allowing attackers to brute-force the management password and gain admin-level permissions. Once authenticated, attackers can interact directly with the AI platform, dumping credentials, listing connected nodes, stealing credentials, and reading application logs. The fix tightens WebSocket security checks and adds additional protections to prevent attackers from abusing localhost loopback connections.
Timeline
-
28.02.2026 19:21 3 articles · 2d ago
ClawJacked Flaw in OpenClaw Enables Local AI Agent Hijacking via WebSocket
A high-severity vulnerability in OpenClaw, codenamed ClawJacked, allows malicious websites to hijack locally running AI agents through WebSocket connections. The flaw exploits missing rate-limiting and auto-approval of trusted devices, enabling attackers to take control of the AI agent. OpenClaw has released a fix in version 2026.2.25, urging users to update immediately and enforce strict governance controls. The vulnerability is caused by the OpenClaw gateway service binding to localhost by default and exposing a WebSocket interface, allowing attackers to brute-force the management password and gain admin-level permissions. Once authenticated, attackers can interact directly with the AI platform, dumping credentials, listing connected nodes, stealing credentials, and reading application logs. The fix tightens WebSocket security checks and adds additional protections to prevent attackers from abusing localhost loopback connections. The OpenClaw gateway acts as a local WebSocket server handling authentication, managing chat sessions, storing configuration, and orchestrating the AI agent. Nodes connected to the gateway can run system commands, access the camera, read contacts, and more. The gateway auto-approves device pairings from localhost with no user prompt.
Show sources
- ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket — thehackernews.com — 28.02.2026 19:21
- ClawJacked attack let malicious websites hijack OpenClaw to steal data — www.bleepingcomputer.com — 01.03.2026 23:44
- ClawJacked Bug Enables Covert AI Agent Hijacking — www.infosecurity-magazine.com — 02.03.2026 13:30
Information Snippets
-
The vulnerability resides in the core OpenClaw gateway, not in plugins or extensions.
First reported: 28.02.2026 19:213 sources, 3 articlesShow sources
- ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket — thehackernews.com — 28.02.2026 19:21
- ClawJacked attack let malicious websites hijack OpenClaw to steal data — www.bleepingcomputer.com — 01.03.2026 23:44
- ClawJacked Bug Enables Covert AI Agent Hijacking — www.infosecurity-magazine.com — 02.03.2026 13:30
-
Attackers can brute-force the gateway password due to missing rate-limiting.
First reported: 28.02.2026 19:213 sources, 3 articlesShow sources
- ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket — thehackernews.com — 28.02.2026 19:21
- ClawJacked attack let malicious websites hijack OpenClaw to steal data — www.bleepingcomputer.com — 01.03.2026 23:44
- ClawJacked Bug Enables Covert AI Agent Hijacking — www.infosecurity-magazine.com — 02.03.2026 13:30
-
Successful authentication grants admin-level permissions, allowing stealthy registration as a trusted device.
First reported: 28.02.2026 19:213 sources, 3 articlesShow sources
- ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket — thehackernews.com — 28.02.2026 19:21
- ClawJacked attack let malicious websites hijack OpenClaw to steal data — www.bleepingcomputer.com — 01.03.2026 23:44
- ClawJacked Bug Enables Covert AI Agent Hijacking — www.infosecurity-magazine.com — 02.03.2026 13:30
-
The flaw enables attackers to interact with the AI agent, dump configuration data, and read application logs.
First reported: 28.02.2026 19:213 sources, 3 articlesShow sources
- ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket — thehackernews.com — 28.02.2026 19:21
- ClawJacked attack let malicious websites hijack OpenClaw to steal data — www.bleepingcomputer.com — 01.03.2026 23:44
- ClawJacked Bug Enables Covert AI Agent Hijacking — www.infosecurity-magazine.com — 02.03.2026 13:30
-
OpenClaw released a fix in version 2026.2.25 on February 26, 2026.
First reported: 28.02.2026 19:213 sources, 3 articlesShow sources
- ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket — thehackernews.com — 28.02.2026 19:21
- ClawJacked attack let malicious websites hijack OpenClaw to steal data — www.bleepingcomputer.com — 01.03.2026 23:44
- ClawJacked Bug Enables Covert AI Agent Hijacking — www.infosecurity-magazine.com — 02.03.2026 13:30
-
Additional vulnerabilities in OpenClaw include log poisoning and multiple CVEs ranging from moderate to high severity.
First reported: 28.02.2026 19:212 sources, 2 articlesShow sources
- ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket — thehackernews.com — 28.02.2026 19:21
- ClawJacked Bug Enables Covert AI Agent Hijacking — www.infosecurity-magazine.com — 02.03.2026 13:30
-
Malicious skills on ClawHub are being used to deliver Atomic Stealer and other malware.
First reported: 28.02.2026 19:211 source, 1 articleShow sources
- ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket — thehackernews.com — 28.02.2026 19:21
-
Microsoft advises treating OpenClaw as untrusted code execution and deploying it in isolated environments.
First reported: 28.02.2026 19:211 source, 1 articleShow sources
- ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket — thehackernews.com — 28.02.2026 19:21
-
The OpenClaw gateway service binds to localhost by default and exposes a WebSocket interface.
First reported: 01.03.2026 23:442 sources, 2 articlesShow sources
- ClawJacked attack let malicious websites hijack OpenClaw to steal data — www.bleepingcomputer.com — 01.03.2026 23:44
- ClawJacked Bug Enables Covert AI Agent Hijacking — www.infosecurity-magazine.com — 02.03.2026 13:30
-
Browser cross-origin policies do not block WebSocket connections to localhost, allowing malicious websites to open connections without triggering warnings.
First reported: 01.03.2026 23:442 sources, 2 articlesShow sources
- ClawJacked attack let malicious websites hijack OpenClaw to steal data — www.bleepingcomputer.com — 01.03.2026 23:44
- ClawJacked Bug Enables Covert AI Agent Hijacking — www.infosecurity-magazine.com — 02.03.2026 13:30
-
The loopback address (127.0.0.1) is exempt from rate limiting by default, allowing brute-force attacks at hundreds of attempts per second.
First reported: 01.03.2026 23:442 sources, 2 articlesShow sources
- ClawJacked attack let malicious websites hijack OpenClaw to steal data — www.bleepingcomputer.com — 01.03.2026 23:44
- ClawJacked Bug Enables Covert AI Agent Hijacking — www.infosecurity-magazine.com — 02.03.2026 13:30
-
Authenticated attackers can dump credentials, list connected nodes, steal credentials, and read application logs.
First reported: 01.03.2026 23:442 sources, 2 articlesShow sources
- ClawJacked attack let malicious websites hijack OpenClaw to steal data — www.bleepingcomputer.com — 01.03.2026 23:44
- ClawJacked Bug Enables Covert AI Agent Hijacking — www.infosecurity-magazine.com — 02.03.2026 13:30
-
The fix in version 2026.2.26 tightens WebSocket security checks and adds protections to prevent brute-force logins and session hijacking.
First reported: 01.03.2026 23:441 source, 1 articleShow sources
- ClawJacked attack let malicious websites hijack OpenClaw to steal data — www.bleepingcomputer.com — 01.03.2026 23:44
-
The OpenClaw gateway acts as a local WebSocket server handling authentication, managing chat sessions, storing configuration, and orchestrating the AI agent.
First reported: 02.03.2026 13:301 source, 1 articleShow sources
- ClawJacked Bug Enables Covert AI Agent Hijacking — www.infosecurity-magazine.com — 02.03.2026 13:30
-
Nodes connected to the gateway can run system commands, access the camera, read contacts, and more.
First reported: 02.03.2026 13:301 source, 1 articleShow sources
- ClawJacked Bug Enables Covert AI Agent Hijacking — www.infosecurity-magazine.com — 02.03.2026 13:30
-
The gateway auto-approves device pairings from localhost with no user prompt.
First reported: 02.03.2026 13:301 source, 1 articleShow sources
- ClawJacked Bug Enables Covert AI Agent Hijacking — www.infosecurity-magazine.com — 02.03.2026 13:30
Similar Happenings
Six New OpenClaw Vulnerabilities Patched
OpenClaw has patched six new vulnerabilities in its agentic AI assistant, including server-side request forgery (SSRF), missing authentication, and path traversal bugs. The vulnerabilities range from moderate to high severity, with some lacking CVE IDs. The flaws affect various components, including the Gateway tool, Telnyx webhook authentication, and browser upload functionality. Endor Labs highlighted the importance of data flow analysis and defense-in-depth validation for AI agent infrastructure. The research also revealed ongoing security concerns, such as misconfigured instances exposed to the public internet and the risk of indirect prompt injection. One additional vulnerability remains unpatched, and major security concerns persist over OpenClaw's undocumented enterprise use.
Infostealer Malware Targets OpenClaw Configuration Files
Infostealer malware has been observed stealing OpenClaw configuration files containing API keys, authentication tokens, and other sensitive secrets. This marks the first known instance of such attacks targeting the popular AI assistant framework. The stolen data includes configuration details, authentication tokens, and persistent memory files, which could enable full compromise of the victim's digital identity. The malware, identified as a variant of the Vidar infostealer, executed a broad file-stealing routine that scanned for sensitive keywords. Researchers predict increased targeting of OpenClaw as it becomes more integrated into professional workflows. Additionally, security issues with OpenClaw have prompted the maintainers to partner with VirusTotal to scan for malicious skills uploaded to ClawHub, establish a threat model, and add the ability to audit for potential misconfigurations.
OpenClaw Security Concerns and AI Agent Exploits
OpenClaw, an AI agent platform, faces significant security concerns as attackers exploit its ecosystem. Malicious skills on ClawHub, a public skills registry, have been discovered, and threat actors are discussing the deployment of OpenClaw skills for botnet operations. The number of malicious packages on npm and PyPI with the name 'claw' has surged, providing new avenues for threat actors. Additionally, attackers are actively scanning exposed OpenClaw gateways, attempting prompt injection and command execution. These developments highlight the risks associated with AI agents' broad permissions and unsupervised deployment.
341 Malicious ClawHub Skills Target OpenClaw Users with Atomic Stealer
A security audit by Koi Security identified 341 malicious skills on ClawHub, a marketplace for OpenClaw users, which distribute Atomic Stealer malware to steal sensitive data from macOS and Windows systems. The campaign, codenamed ClawHavoc, uses social engineering tactics to trick users into installing malicious prerequisites. The skills masquerade as legitimate tools, including cryptocurrency utilities, YouTube tools, and finance applications. OpenClaw has added a reporting feature and partnered with VirusTotal to scan skills uploaded to ClawHub, providing an additional layer of security for the OpenClaw community. The malware targets API keys, credentials, and other sensitive data, exploiting the open-source ecosystem's vulnerabilities. The campaign coincides with a report from OpenSourceMalware, highlighting the same threat. The intersection of AI agent capabilities and persistent memory amplifies the risks, enabling stateful, delayed-execution attacks. New findings reveal almost 400 fake crypto trading add-ons in the project behind the viral Moltbot/OpenClaw AI assistant tool can lead users to install information-stealing malware. These addons, called skills, masquerade as cryptocurrency trading automation tools and target ByBit, Polymarket, Axiom, Reddit, and LinkedIn. The malicious skills share the same command-and-control (C2) infrastructure, 91.92.242.30, and use sophisticated social engineering to convince users to execute malicious commands which then steals crypto assets like exchange API keys, wallet private keys, SSH credentials, and browser passwords.
OpenClaw Token Exfiltration Vulnerability Enables One-Click RCE
A high-severity vulnerability (CVE-2026-25253, CVSS 8.8) in OpenClaw, an open-source AI assistant, allows remote code execution via a malicious link. The flaw enables token exfiltration and full gateway compromise. The issue was patched in version 2026.1.29 released on January 30, 2026. The vulnerability arises because the Control UI trusts the gatewayUrl parameter without validation, auto-connecting and sending the stored gateway token in the WebSocket connect payload. This allows an attacker to connect to the victim's local gateway, modify configurations, and execute privileged actions. OpenClaw integrates with various messaging platforms and has gained rapid popularity, with its GitHub repository crossing 149,000 stars. The vulnerability can be exploited to achieve one-click RCE by visiting a malicious web page, leveraging cross-site WebSocket hijacking due to the lack of origin header validation.