
The SonicWall Capture Labs threat research team became aware of an authentication token theft vulnerability in OpenClaw, assessed its impact and developed mitigation measures. OpenClaw is a widely used open-source AI assistant platform that integrates with numerous messaging services and provides deep system-level capabilities.
The issue, tracked as CVE-2026-25253, affects all versions prior to 2026.1.29. This flaw, categorized under CWE-669 (Incorrect Resource Transfer Between Spheres), allows an unauthenticated remote attacker to steal an authentication token, which can then be used to achieve remote code execution, earning a high CVSS score of 8.8. As OpenClaw continues to gain popularity and broader adoption, the risk associated with this vulnerability increases significantly. Users are strongly encouraged to apply the vendor-provided updates without delay.
OpenClaw, previously known as Clawdbot and referred to as Moltbot in early versions, is an AI assistant framework that runs locally on macOS, Windows, or Linux. It supports cloud-based models such as Anthropic and OpenAI, as well as local models. Figure 1 illustrates the overall OpenClaw architecture. The Control UI is a single-page application built with Lit web components and served at /chat. It communicates with the gateway server over WebSocket, typically using ws://127.0.0.1:18789/ or wss://host:18789/.

Key security characteristics of OpenClaw include:
An attacker can craft a malicious link that causes the victim’s browser to:

The initial fix introduced in version 2026.1.29, as shown in Figure 3, adds a confirmation prompt whenever the gatewayUrl is changed. This helps deter simple one-click exploitation by requiring user interaction.

Later updates implemented stringent origin validation controls, as shown in Figure 4. The new logic evaluates incoming requests using the following checks:

The exploitation process typically follows these steps:
Successful exploitation enables a remote, unauthenticated attacker to steal an authentication token and use it to gain full control of the affected system. Figure 5 demonstrates a sample exploitation, showing successful token capture using a publicly available exploit. Given OpenClaw’s extensive system privileges, this vulnerability can result in complete compromise of the operator’s machine.
Figure 5 Exploit in action
With OpenClaw’s growing user base and increasing deployment footprint, organizations and individual users should upgrade to the latest patched version as outlined in the official vendor advisory.
Share This Article

An Article By
An Article By
Security News
Security News