2 Sources
2 Sources
[1]
'A human-chosen password doesn't stand a chance': OpenClaw has yet another major security flaw -- here's what we know about "ClawJacked"
* Oasis security researchers find a high-severity flaw in OpenClaw AI agent * Exploit allowed malicious websites to brute-force local gateway authentication and gain full control * Vulnerability patched within 24 hours; users urged to upgrade to version 2026.2.25 or later OpenClaw, the vastly popular open source AI agent platform, was vulnerable to a high-severity flaw which allowed threat actors to steal sensitive data from target computers with relative ease, experts have warned. The bug was discovered by security researchers Oasis, and was patched following responsible disclosure. For those unfamiliar with OpenClaw, it is an AI agent that users install on their computers and interact with through a web dashboard or terminal. The tool connects to calendars, messaging apps, and can respond to emails, set up calendar events, and more. It is currently one of the most popular AI projects, with more than 100,000 stars on GitHub. Brute forcing the password But the very design of the tool left a gaping security hole which, according to Oasis, is relatively easy to exploit. It doesn't require a third-party addon, previous compromise, or anything of sorts. All the victim needs to do is visit a malicious website. "What we found is different. Our vulnerability lives in the core system itself -- no plugins, no marketplace, no user-installed extensions -- just the bare OpenClaw gateway, running exactly as documented," the researchers explained. Explaining how the bug works, Oasis says OpenClaw runs a local WebSocket server that handles authentication, and more. Nodes, such as companion apps and other machines, connect to the gateway, expose capabilities, run system commands, and access the camera (among other things). The gateway can dispatch commands to any connected node. Authentication is handled either via a token or a password, and the gateway binds to localhost by default. If a victim visits a malicious website, its JavaScript can open a WebSocket connection to localhost, brute-force the gateway password with ease, and authenticate as a fully trusted device. Once that happens, "the attacker then has full control," Oasis concluded. "They can interact with the AI agent, dump configuration data, enumerate connected devices, and read logs." A fix was deployed 24 hours after initial disclosure, and users are urged to upgrade their instances to version 2026.2.25 or later. Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button! And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.
[2]
OpenClaw Patch Prevents Malicious Websites From Hijacking AI Agents | PYMNTS.com
By completing this form, you agree to receive marketing communications from PYMNTS and to the sharing of your information with our sponsor, if applicable, in accordance with our Privacy Policy and Terms and Conditions. Attacks were enabled by developers simply browsing the web and accidentally landing on a malicious website, according to the post. Oasis discovered the vulnerability and reported it to the OpenClaw security team, which classified the vulnerability as high severity and pushed a fix within 24 hours, the post said. While there are over 1,000 fake plugins on OpenClaw's community marketplace, ClawHub, that are actually malicious, this incident involved a vulnerability in the AI agent's core system itself, per the post. "For many organizations, OpenClaw installations represent a growing category of shadow AI: developer-adopted tools that operate outside IT's visibility, often with broad access to local systems and credentials, and no centralized governance," Oasis said in the post. To mitigate the risk from attacks like this one, Oasis recommended in the post that organizations inventory the AI agents and assistants being used by their developers, immediately update OpenClaw, audit the credentials and capabilities granted to AI agents and revoke those that are not actively needed, and establish governance for non-human identities. "As AI agents become standard tools in every developer's workflow, the question isn't whether to adopt them, it's whether you can govern them," Oasis said in the post.
Share
Share
Copy Link
Security researchers at Oasis uncovered a high-severity flaw in OpenClaw, the popular open-source AI agent platform with over 100,000 GitHub stars. The vulnerability allowed malicious websites to brute-force authentication and gain full control over users' systems simply by having them visit a compromised page. The flaw was patched within 24 hours, but it highlights growing concerns about shadow AI and governance gaps.
A critical security vulnerability in OpenClaw, one of the most popular open-source AI agent platforms, allowed malicious websites to hijack AI agents and steal sensitive data from users' computers. Security researchers at Oasis discovered the flaw, dubbed "ClawJacked," which exploited a weakness in the platform's core system rather than any third-party plugins or extensions
1
. The vulnerability affected OpenClaw installations running as documented, making it particularly dangerous for the platform's extensive user base—OpenClaw currently holds more than 100,000 stars on GitHub1
.
Source: TechRadar
The attack vector was alarmingly simple. Users only needed to visit a malicious website for threat actors to gain full control of their AI agents. Once a victim landed on a compromised page, JavaScript code could open a WebSocket connection to localhost and brute-force the gateway authentication with ease
1
. According to Oasis, attacks were enabled by developers simply browsing the web and accidentally landing on a malicious website2
.The high-severity flaw resided in OpenClaw's fundamental architecture. The platform runs a local WebSocket server that handles authentication and coordinates communication between the gateway and connected nodes such as companion apps and other machines
1
. These nodes expose capabilities, run system commands, and access hardware like cameras. Authentication is managed through either a token or a password, with the gateway binding to localhost by default."What we found is different. Our vulnerability lives in the core system itself—no plugins, no marketplace, no user-installed extensions—just the bare OpenClaw gateway, running exactly as documented," Oasis researchers explained
1
. Once attackers successfully brute-force the password and authenticate as a trusted device, they gain full control over the system. They can interact with the AI agent, dump configuration data, enumerate connected devices, and read logs1
.
Source: PYMNTS
Following responsible disclosure by Oasis, the OpenClaw security team classified the vulnerability as high severity and deployed a fix within 24 hours
1
2
. Users are strongly urged to upgrade their instances to version 2026.2.25 or later to protect against potential exploitation1
. The swift response demonstrates the importance of coordinated vulnerability disclosure, though questions remain about how many users may have been exposed before the patch.Related Stories
This incident underscores a broader challenge facing organizations: the rise of shadow AI. "For many organizations, OpenClaw installations represent a growing category of shadow AI: developer-adopted tools that operate outside IT's visibility, often with broad access to local systems and credentials, and no centralized governance," Oasis noted
2
. While there are over 1,000 fake plugins on OpenClaw's community marketplace, ClawHub, that are actually malicious, this particular vulnerability affected the platform's core architecture rather than third-party extensions2
.To mitigate risks from similar attacks, Oasis recommended that organizations inventory the AI agents and assistants being used by their developers, immediately update OpenClaw installations, audit the credentials and capabilities granted to AI agents and revoke those not actively needed, and establish governance for non-human identities
2
. "As AI agents become standard tools in every developer's workflow, the question isn't whether to adopt them, it's whether you can govern them," Oasis stated2
.The ClawJacked vulnerability serves as a warning about the security implications of developer-adopted AI tools that integrate deeply with local systems. As AI agents gain access to calendars, messaging apps, emails, and system commands, the potential damage from compromised authentication grows exponentially. Organizations must balance the productivity benefits of these tools against the need for robust security controls and visibility into how AI agents access and handle sensitive data.
Summarized by
Navi
04 Feb 2026•Technology

16 Feb 2026•Technology

27 Jan 2026•Technology

1
Technology

2
Policy and Regulation

3
Policy and Regulation
