PocketClawvol. 1 · 2026
critical · CVSS 9.6exploited in wildpatched

CVE-2026-25253

OpenClaw — 1-click RCE via WebSocket origin bypass

Summary

OpenClaw's local dashboard accepts WebSocket connections without validating the Origin header. Any web page visited while OpenClaw is running can open the WebSocket and trigger tool execution. With default tools enabled, this is a full RCE.

Details

CVE IDCVE-2026-25253
Severitycritical (9.6)
CVSS vectorAV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Published2026-01-25
Patched2026-01-27
Affected versions≤ 2026.2.9
Fixed in2026.2.10
Exploited in the wildyes

Affected projects

OpenClaw

What to do

  • If you run an affected version: upgrade to 2026.2.10 immediately. Do not delay this for convenience reasons.
  • Rotate any credentials that may have been exposed via the affected component.
  • Audit your logs for indicators of exploitation — unexpected outbound traffic, anomalous tool calls, unfamiliar authenticated sessions.
  • If exploitation is confirmed, treat the host as compromised: rebuild from a clean image, rotate every secret on the host, audit lateral movement.

Sources


See also: all CVEs, tracked agents, methodology.