CVE-2026-25253 Overview
OpenClaw (also known as clawdbot or Moltbot) before version 2026.1.29 contains a critical vulnerability that allows attackers to steal authentication tokens through malicious WebSocket connections. The application obtains a gatewayUrl value from a query string parameter and automatically establishes a WebSocket connection without user prompting, transmitting sensitive token values to attacker-controlled servers.
Critical Impact
This vulnerability enables one-click remote code execution (RCE) attacks, allowing threat actors to steal sensitive Moltbot data and authentication keys through crafted malicious URLs.
Affected Products
- OpenClaw (clawdbot) versions prior to 2026.1.29
- Moltbot versions prior to 2026.1.29
Discovery Timeline
- 2026-02-01 - CVE-2026-25253 published to NVD
- 2026-02-03 - Last updated in NVD database
Technical Details for CVE-2026-25253
Vulnerability Analysis
This vulnerability is classified under CWE-669 (Incorrect Resource Transfer Between Spheres), indicating that the application improperly transfers sensitive authentication tokens to external resources without proper validation. The flaw exists in how OpenClaw handles the gatewayUrl parameter from query strings, automatically initiating WebSocket connections to arbitrary endpoints and transmitting authentication tokens without user consent or validation.
The attack can be executed remotely over the network and requires minimal user interaction—typically just clicking a malicious link. Once exploited, an attacker gains access to authentication tokens, potentially leading to complete compromise of user data and system access. The vulnerability affects confidentiality, integrity, and availability of the affected systems.
Root Cause
The root cause stems from improper validation of the gatewayUrl query string parameter. OpenClaw trusts user-supplied URL values without verification, creating a classic open redirect vulnerability that escalates to token theft. The application fails to implement proper URL allowlisting or user confirmation before establishing WebSocket connections to external endpoints.
Attack Vector
An attacker crafts a malicious URL containing a gatewayUrl parameter pointing to an attacker-controlled WebSocket server. When a victim clicks this link, the OpenClaw application automatically:
- Parses the malicious gatewayUrl from the query string
- Establishes a WebSocket connection to the attacker's server without prompting
- Transmits the user's authentication token over this connection
- The attacker captures the token and can impersonate the victim
The attack requires network access and minimal user interaction (a single click), making it highly effective for phishing campaigns. For detailed technical analysis, see the DepthFirst RCE Exploit Analysis and the Ethiack Blog RCE Overview.
Detection Methods for CVE-2026-25253
Indicators of Compromise
- Outbound WebSocket connections to unexpected or unknown external domains
- Query strings containing suspicious gatewayUrl parameters with external URLs
- Authentication token transmission in WebSocket traffic to non-standard endpoints
- User reports of clicking links that triggered unexpected application behavior
Detection Strategies
- Monitor application logs for WebSocket connection attempts to external domains not in your allowlist
- Implement network detection rules for outbound WebSocket traffic containing authentication tokens
- Deploy web application firewall (WAF) rules to inspect and block malicious query string parameters
- Review proxy logs for unusual patterns of WebSocket handshakes to unfamiliar endpoints
Monitoring Recommendations
- Enable verbose logging for WebSocket connection events in OpenClaw deployments
- Configure SIEM alerts for authentication token transmission patterns in network traffic
- Monitor for phishing campaigns distributing malicious OpenClaw URLs
- Track external references and security advisories for updated IOCs related to this vulnerability
How to Mitigate CVE-2026-25253
Immediate Actions Required
- Upgrade OpenClaw to version 2026.1.29 or later immediately
- Audit systems for any evidence of exploitation or token theft
- Rotate all authentication tokens and API keys for potentially affected users
- Implement URL validation for any gatewayUrl parameters at the network perimeter
Patch Information
The vulnerability has been addressed in OpenClaw version 2026.1.29. Organizations should upgrade to this version or later as soon as possible. For additional details, refer to the GitHub Security Advisory GHSA-g8p2-7wf7-98mq and the OpenClaw Blog for official vendor communications.
Workarounds
- Implement network-level filtering to block outbound WebSocket connections to untrusted domains
- Deploy browser-based content security policies (CSP) that restrict WebSocket connections to allowlisted endpoints
- Educate users to avoid clicking on suspicious links containing OpenClaw URL parameters
- Consider temporarily disabling automatic WebSocket connection features until patching is complete
# Example: Network firewall rule to restrict WebSocket connections
# Allow WebSocket connections only to trusted OpenClaw endpoints
iptables -A OUTPUT -p tcp --dport 443 -m string --string "upgrade: websocket" --algo bm -j DROP
# Whitelist legitimate OpenClaw gateway URLs in your firewall configuration
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


