Trending:
Cybersecurity

OpenClaw patches one-click RCE - third critical vulnerability in five days

The AI agent framework patched a remote code execution flaw that required only a malicious link to compromise systems. It's the latest in a series of security issues plaguing the project formerly known as ClawdBot and Moltbot, which has now documented vulnerabilities in 22-26% of its plugins.

OpenClaw patches one-click RCE - third critical vulnerability in five days

OpenClaw shipped another critical security patch over the weekend, addressing a one-click remote code execution vulnerability that could compromise systems through a single malicious web page.

The flaw (CVE-2026-25253) exploited OpenClaw's failure to validate WebSocket origin headers. An attacker could craft a webpage with JavaScript that retrieved authentication tokens, established a WebSocket connection, disabled sandboxing, and executed arbitrary code - all in milliseconds. Security researcher Mav Levin from DepthFirst disclosed the issue Sunday; the OpenClaw team patched it within hours.

This is the third significant vulnerability in less than a week for the open-source AI agent framework, which has cycled through three names (ClawdBot → Moltbot → OpenClaw) while accumulating a concerning security track record.

The architectural problem

OpenClaw's core design enables autonomous execution of system-level commands with file read/write access - prioritising usefulness over security. Security researchers have documented what they call a "lethal trifecta": access to private data, exposure to untrusted inputs, and external communication capabilities.

The numbers tell the story: 22-26% of OpenClaw plugins contain vulnerabilities, including credential stealers disguised as benign tools. Testing has revealed skills executing silent curl commands to exfiltrate data while bypassing safety guidelines. Token Security reported 22% of enterprise customers had unauthorised OpenClaw deployments, with over half granting privileged access.

What this means in practice

OpenClaw instances frequently store Anthropic API keys, OAuth tokens, and conversation histories in plaintext in unsecured paths. Control UI dashboards are often internet-accessible despite authentication attempts. Because OpenClaw spans personal, enterprise, and cloud contexts, compromise in one domain enables lateral movement across all three.

The project's own documentation acknowledges: "There is no 'perfectly secure' setup."

Security researcher Jamieson O'Reilly, recently brought on board by OpenClaw, praised Levin's find and welcomed further security contributions. The team is responding quickly to disclosures. The question is whether rapid patching can keep pace with an architecture that makes security optional rather than built-in.

IBM researcher Kaoutar El Maghraoui suggests context matters - personal use on isolated devices poses lower risk than enterprise deployment. She predicts OpenClaw will eventually be replaced by tools offering "hybrid integration" - modularity for local execution with deeper controls at scale.

That doesn't address the immediate risk: current deployments remain fundamentally vulnerable, regardless of intended use case.