HomeVulnerabilityClawJacked assault let malicious web sites hijack OpenClaw to steal information

ClawJacked assault let malicious web sites hijack OpenClaw to steal information

Safety researchers have disclosed a high-severity vulnerability dubbed “ClawJacked” within the well-liked AI agent OpenClaw that allowed a malicious web site to silently bruteforce entry to a domestically operating occasion and take management over it.

Oasis Safety found the problem and reported it to OpenClaw, with a repair being launched in model 2026.2.26 on February 26.

OpenClaw is a self-hosted AI platform that has lately surged in recognition for enabling AI brokers to autonomously ship messages, execute instructions, and handle duties throughout a number of platforms.

Based on Oasis Safety, the vulnerability is attributable to the OpenClaw gateway service binding to localhost by default and exposing a WebSocket interface.

As a result of browser cross-origin insurance policies don’t block WebSocket connections to localhost, a malicious web site visited by an OpenClaw person can use JavaScript to silently open a connection to the native gateway and try authentication with out triggering any warnings.

Whereas OpenClaw contains fee limiting to forestall brute-force assaults, the loopback deal with (127.0.0.1) is exempt by default, so native CLI classes usually are not mistakenly locked out.

See also  RondoDox botnet targets 56 n-day flaws in worldwide assaults

The researchers discovered that they may brute-force the OpenClaw administration password at lots of of makes an attempt per second with out failed makes an attempt being throttled or logged. As soon as the proper password is guessed, the attacker can silently register as a trusted system, because the gateway routinely approves system pairings from localhost with out requiring person affirmation.

“In our lab testing, we achieved a sustained fee of lots of of password guesses per second from browser JavaScript alone,” explains Oasis.

“At that velocity, an inventory of frequent passwords is exhausted in beneath a second, and a big dictionary would take solely minutes. A human-chosen password would not stand an opportunity.”

With an authenticated session and admin permissions, the attacker can now work together straight with the AI platform, dumping credentials, itemizing linked nodes, stealing credentials, and studying utility logs.

Oasis says this might permit an attacker to instruct the agent to go looking messaging histories for delicate info, exfiltrate recordsdata from linked gadgets, or execute arbitrary shell instructions on paired nodes, successfully leading to full workstation compromise triggered from a browser tab.

See also  Lately patched Juniper firewall flaws enable distant code execution

Oasis shared an indication of this assault, exhibiting the way it could possibly be used to steal delicate information by the OpenClaw vulnerability.

Oasis reported the problem to OpenClaw, together with technical particulars and proof-of-concept code, and it was mounted inside 24 hours of disclosure.

The repair tightens WebSocket security checks and provides extra protections to forestall attackers from abusing localhost loopback connections to brute-force logins or hijack classes, even when these connections are configured to be exempt from fee limiting.

Organizations and builders operating OpenClaw ought to replace to model 2026.2.26 or later instantly to forestall their installations from being hijacked.

With OpenClaw’s large recognition, security researchers have been specializing in figuring out vulnerabilities and assaults concentrating on the platform.

Risk actors have been seen abusing the “ClawHub” OpenClaw expertise repository to advertise malicious expertise that deploy infostealing malware or trick customers into operating malicious instructions on their gadgets.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular