Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. OpenClaw AI Agent Flaws Enable Prompt Injection, 1-Click
OpenClaw AI Agent Flaws Enable Prompt Injection, 1-Click
NEWS

OpenClaw AI Agent Flaws Enable Prompt Injection, 1-Click

China's CNCERT has warned that OpenClaw (formerly Clawdbot/Moltbot), the viral self-hosted AI agent, carries over 250 disclosed vulnerabilities including...

Dylan H.

News Desk

March 14, 2026
6 min read

OpenClaw: The Viral AI Agent That Became a Security Crisis

OpenClaw — the self-hosted AI agent framework that lets large language models autonomously operate computers, browse the web, execute shell commands, and manage email — has accumulated a staggering security debt since going viral in early 2026. China's National Computer Network Emergency Response Technical Team (CNCERT) issued a formal risk alert on March 10, 2026, citing over 258 disclosed vulnerabilities and ordering state-run enterprises and government agencies to ban its use outright.

Originally launched as Clawdbot in November 2025 by Austrian developer Peter Steinberger, the project was rebranded to Moltbot and then OpenClaw following trademark pressure. The framework stores all credentials, API keys, and environment variables in cleartext under ~/.clawdbot by default — an architectural decision that amplifies every other vulnerability listed below.


CVE-2026-25253 — 1-Click RCE via Auth Token Exfiltration (CVSS 8.8)

Discovered by: Mav Levin, depthfirst research team Affected versions: All versions up to v2026.1.24-1 Fixed in: v2026.1.29 (January 30, 2026)

The Control UI accepted a gatewayUrl parameter from the URL query string and auto-connected to it on page load — without user confirmation — transmitting the stored gateway authentication token in the WebSocket connection payload.

The Kill Chain

  1. Victim visits an attacker-crafted URL
  2. Auth token is exfiltrated via the auto-connecting WebSocket within milliseconds
  3. Attacker uses the stolen token for cross-site WebSocket hijacking
  4. exec.approvals.set is disabled — bypassing all sandbox and confirmation prompts
  5. tools.exec.host is patched to gateway — escaping the Docker container
  6. node.invoke executes arbitrary shell commands directly on the host OS

The result is full host-level RCE from a single browser visit. Safety guardrails are irrelevant because the exploit operates at the infrastructure layer, not the LLM layer.

Fix: A gateway URL confirmation modal was added, removing the auto-connect behavior.


ClawJacked — WebSocket Localhost Hijack

Discovered by: Oasis Security Fixed in: v2026.2.26

The OpenClaw gateway binds to localhost and exposes a WebSocket interface. Browser cross-origin policies do not block WebSocket connections to localhost, meaning any website the victim visits can silently open a connection to the local gateway.

Critically, the gateway's rate limiter exempted localhost connections entirely, allowing a malicious JavaScript payload delivered from any compromised or malicious site to brute-force the gateway password at hundreds of attempts per second.

What an Attacker Gains

Once authenticated via the hijacked WebSocket:

  • Full messaging history (email, Telegram, Discord, etc.)
  • Files from connected/paired devices
  • All stored API keys and credentials
  • Arbitrary shell command execution on the host
  • No plugins, browser extensions, or user interaction required beyond visiting a malicious page

Prompt Injection: An Unfixable Attack Surface

OpenClaw's connectors — email, web browsing, messaging apps — do not isolate or sanitize content before passing it to the LLM. Injected instructions embedded in emails, web pages, or documents can instruct the agent to:

  • Silently forward email contents to an attacker-controlled URL
  • Load and leak environment variables and API credentials one-by-one
  • Reroute agent communication to attacker-controlled infrastructure
  • Join attacker-controlled Telegram or Discord groups

PromptArmor researchers identified a particularly insidious variant: when OpenClaw is used via Discord or Telegram, prompt-injected payloads cause the agent to generate a URL, which the messaging app's link-preview mechanism automatically fetches — transmitting the extracted data with no further user interaction required.


ClawHub Supply Chain: 800+ Malicious Skills

The ClawHub community skills registry — OpenClaw's equivalent of a plugin store — has been actively weaponized. In the ClawHavoc campaign:

  • Initial scan: 341 malicious skills (~12% of the registry)
  • Updated scans: over 800 malicious skills (~20% of the registry)

Notable malicious skills include bob-p2p-beta and runware. Payloads include:

PayloadBehavior
Atomic macOS StealerCredential and cookie theft on macOS
Crypto-minersSilent CPU/GPU mining on developer machines
Silent data exfiltrationHardcoded curl commands POST data to attacker C2 — invisible to the user

China's CNCERT Warning and Government Ban

On March 10, 2026, CNCERT and China's Ministry of Industry and Information Technology (MIIT) issued a joint alert:

  • Over 40,000 OpenClaw instances are exposed on the public internet
  • An estimated 60%+ are vulnerable to immediate takeover
  • "Inherently weak default security configurations" and privileged OS access cited as primary risks
  • Prompt injection flagged as a core attack vector
  • "Misoperation" risk highlighted — the agent may misinterpret commands and delete production data or emails
  • Government agencies and major banks ordered to restrict use
  • State-run enterprises barred from running OpenClaw apps on office computers

China's reaction mirrors concerns previously raised about other viral AI tools with wide OS-level permissions and poor default hardening.


Vulnerability Summary

CVE / IssueCVSSFixed VersionStatus
CVE-2026-25253 (1-Click RCE)8.8v2026.1.29Patched
ClawJacked (WebSocket hijack)Highv2026.2.26Patched
Malicious ClawHub skills—Version-independentOngoing — registry hygiene

Beyond these, a full audit disclosed 512 total vulnerabilities, with 8 classified as Critical.


Recommendations

If you are running OpenClaw in any capacity:

  1. Update to v2026.2.26 or later immediately
  2. Rotate all stored credentials — auth tokens, API keys, SSH keys — after updating
  3. Run agents with minimal OS permissions — never grant "god mode" or unrestricted file/network access
  4. Do not expose the Control UI or gateway port to the internet or untrusted networks
  5. Audit installed skills against the ClawHavoc IOC list before running any skill
  6. Treat the gateway host as sensitive infrastructure — apply appropriate network segmentation and logging
  7. Disable email and messaging connectors in environments handling sensitive data until the registry situation stabilizes
  8. Do not connect OpenClaw to accounts containing sensitive production data while supply chain risk remains unresolved

Sources

  • The Hacker News — OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration
  • depthfirst — 1-Click RCE To Steal Your OpenClaw Data and Keys (CVE-2026-25253)
  • Oasis Security — ClawJacked: OpenClaw Vulnerability Enables Full Agent Takeover
  • BleepingComputer — ClawJacked attack let malicious websites hijack OpenClaw to steal data
  • Global Times — CNCERT issues risk alert on OpenClaw as AI agent goes viral in China
  • Palo Alto Networks — Why OpenClaw May Signal the Next AI Security Crisis

Related Reading

  • Cline CLI Supply Chain Attack Installs Unauthorized
  • AI-Driven Threats Accelerate: Agentic Attacks, Model
  • Microsoft Discovers
#OpenClaw#AI Security#Prompt Injection#RCE#CVE-2026-25253#Supply Chain#China#CNCERT#Agentic AI#Data Exfiltration

Related Articles

AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE

Security researchers disclosed critical flaws across three major AI platforms: Amazon Bedrock AgentCore's sandbox can be bypassed via DNS to exfiltrate...

8 min read

Cline CLI Supply Chain Attack Installs Unauthorized

A compromised npm publish token was used to inject a malicious postinstall script into Cline CLI version 2.3.0 on February 17, 2026, silently installing...

6 min read

Paid AI Accounts Are Now a Hot Underground Commodity

New research from Flare Systems reveals that premium AI platform access — including ChatGPT Plus, Claude Pro, and raw API keys — has been systematically...

5 min read
Back to all News