1-Click Clawdbot Vulnerability Enable Malicious Remote Code Execution Attacks


A critical vulnerability in OpenClaw, the open-source AI personal assistant trusted by over 100,000 developers, has been discovered and weaponized into a devastating one-click remote code execution exploit.

Security researchers at depthfirst General Security Intelligence uncovered a logic flaw that, when combined with other vulnerabilities, could trigger a chain reaction.

Allows attackers to gain complete control of victim systems via a single malicious link, requiring no user interaction.

Vulnerability Overview: Technical Attack Mechanics

OpenClaw’s architecture grants AI agents “god mode” access to messaging apps, API keys, and unrestricted control of the local computer.

While community enthusiasm surrounding the platform has driven rapid adoption, the security margin for error in such a high-privilege environment becomes razor-thin.

AttributeDetails
ProductOpenClaw (formerly ClawdBot/Moltbot)
Vulnerability TypeUnsafe URL Parameter Handling + Cross-Site WebSocket Hijacking
ImpactUnauthenticated Remote Code Execution with System-Level Access
CVSS ScoreCritical (9.8+)
Attack VectorNetwork (Single Malicious Link)

The newly disclosed vulnerability exploits three distinct components working in sequence: unsafe URL parameter ingestion, immediate gateway connection without validation, and automatic transmission of authentication tokens.

google

The exploitation chain begins with three seemingly benign operations occurring independently across the codebase.

The app-settings.ts module blindly accepts the gatewayUrl query parameter from the URL without validation, then stores it directly in localStorage.

Upon setting the application, the app-lifecycle.ts immediately triggers connectGateway(), which automatically bundles the security-sensitive authToken into the connection handshake to the attacker-controlled gateway server.

1-Click RCE Exploit Kill Chain  source: depthfirst)
1-Click RCE Exploit Kill Chain source: depthfirst)

This pattern creates a critical information disclosure vulnerability. The kill chain exploits an additional WebSocket origin validation flaw.

StageDescription
VisitUser lands on malicious site.
LoadJS loads OpenClaw with malicious gatewayUrl.
LeakauthToken sent to attacker.
ConnectWebSocket opened to localhost.
BypassSafety guardrails disabled.
ExecuteAttacker runs arbitrary commands.

When victims visit a malicious webpage, attacker-injected JavaScript executes within their browser context, establishing a local connection to the victim’s OpenClaw instance running on localhost:18789.

Unlike standard HTTP connections, browser WebSocket implementations do not enforce Same-Origin Policy protections; instead, they rely on server-side origin header validation, which OpenClaw omits entirely.

This Cross-Site WebSocket Hijacking (CSWSH) enables the attacker to pivot through the victim’s browser as a proxy.

Once authenticated via the stolen token, the attacker leverages the operator. admin and operator roles. approvals, and scopes to turn off safety mechanisms.

An exec. approvals.set request turns off user confirmation prompts, while a config. patch request sets tools.exec.host to “gateway,” forcing command execution directly on the host machine rather than within containerized sandboxes.

The final payload invokes node. invoke with arbitrary bash commands, achieving complete system compromise.

Mitigations

The OpenClaw development team rapidly addressed the vulnerability by implementing a gateway URL confirmation modal, eliminating the auto-connect without prompt behavior that enabled the attack.

DepthFirst advises all users running versions before v2026.1.24-1 remain vulnerable and should upgrade immediately.

Administrators should rotate authentication tokens and audit command execution logs for suspicious activity.

This incident underscores the security risks inherent in granting AI agents unrestricted system access without robust validation of configuration changes and network connections.

Organizations deploying OpenClaw should implement additional network segmentation, restrict outbound WebSocket connections from AI agent processes, and maintain strict audit logging for authentication token usage and privilege modifications.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link