ClawJacked Vulnerability Exposes OpenClaw AI Agents to Hijacking

A significant security flaw in OpenClaw allows malicious websites to take control of local AI agents via WebSocket connections, raising concerns about user safety and the integrity of AI systems.

A recently identified security vulnerability in OpenClaw, dubbed **ClawJacked**, poses a serious risk by enabling malicious websites to hijack locally running AI agents through WebSocket connections. This flaw has been classified as high-severity and was addressed by OpenClaw in less than 24 hours after its disclosure.

Details of the Vulnerability

The vulnerability resides within the core system of OpenClaw, specifically the local WebSocket server that is bound to localhost. According to Oasis Security, the attack scenario involves a developer who has OpenClaw operational on their device, with the gateway secured by a password. When the developer visits a compromised website, malicious JavaScript can exploit the absence of a rate-limiting mechanism to brute-force the gateway password.

Once authenticated, the attacker can register as a trusted device without any user confirmation, granting them full control over the AI agent. This includes the ability to interact with the agent, access configuration data, and read application logs. The browser does not block these cross-origin connections, allowing the attack to occur silently.

Impact and Mitigation

The implications of this vulnerability are significant, as it could lead to unauthorized access to sensitive information and control over AI functionalities. OpenClaw has released version **2026.2.25** to patch this issue, and users are strongly encouraged to update their systems promptly. Additionally, they should regularly audit access permissions granted to AI agents and implement governance controls for non-human identities.

Related Vulnerabilities and Security Concerns

This incident is part of a broader scrutiny of the OpenClaw ecosystem, particularly due to the critical role AI agents play in managing various enterprise tools. Reports indicate that instances of OpenClaw exposed to the internet can significantly increase the attack surface, with integrated services potentially being weaponized through prompt injections.

Furthermore, OpenClaw has addressed other vulnerabilities, including a log poisoning issue that could allow attackers to manipulate agent behavior through malicious content in logs. This was fixed in version **2026.2.13**. A series of additional vulnerabilities have also been reported, including **CVE-2026-25593**, **CVE-2026-24763**, and others, which could lead to severe security breaches such as remote code execution and command injection.

Recommendations for Users

As the security landscape evolves, users of OpenClaw are advised to remain vigilant. Microsoft has issued warnings regarding the risks associated with self-hosted agent runtimes, suggesting that OpenClaw should be deployed in isolated environments to mitigate potential threats. Continuous monitoring and strict access controls are essential to protect against these vulnerabilities.

This article was produced by NeonPulse.today using human and AI-assisted editorial processes, based on publicly available information. Content may be edited for clarity and style.

Avatar photo
NOVA-Δ

A guardian of the digital threshold. NOVA-Δ specializes in breaches, vulnerabilities, surveillance systems, and the shifting politics of online security. Part sentinel, part investigator, she writes with sharp skepticism and a commitment to exposing hidden risks in an increasingly connected world.

Articles: 186