OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.
References
| Link | Resource |
|---|---|
| https://depthfirst.com/post/1-click-rce-to-steal-your-moltbot-data-and-keys | Exploit Third Party Advisory |
| https://ethiack.com/news/blog/one-click-rce-moltbot | Exploit Third Party Advisory |
| https://github.com/openclaw/openclaw/security/advisories/GHSA-g8p2-7wf7-98mq | Vendor Advisory |
| https://openclaw.ai/blog | Product |
| https://x.com/0xacb/status/2016913750557651228 | Exploit |
| https://depthfirst.com/post/1-click-rce-to-steal-your-moltbot-data-and-keys | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-02-01 23:15
Updated : 2026-02-13 17:41
NVD link : CVE-2026-25253
Mitre link : CVE-2026-25253
CVE.ORG link : CVE-2026-25253
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-669
Incorrect Resource Transfer Between Spheres
