Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical OpenClaw Vulnerability Allows AI Agent Hijacking

Critical OpenClaw Vulnerability Allows AI Agent Hijacking

Posted on March 1, 2026 By CWS

A newly found security flaw in OpenClaw, a rapidly expanding open-source AI agent platform, poses serious risks. Discovered by Oasis Security experts, this zero-interaction vulnerability enables malicious websites to take over a developer’s AI agent without requiring any plugins or user actions.

OpenClaw, which has undergone several name changes from Clawdbot to MoltBot, has swiftly gained popularity, amassing over 100,000 stars on GitHub within just five days. It serves as a vital tool for numerous developers, operating as a personal assistant that integrates with messaging apps, development tools, and local systems on developer laptops.

Understanding the Attack Mechanics

The attack targets the OpenClaw system by exploiting its local WebSocket gateway, which connects various devices like macOS apps and iOS devices to the AI agent. This gateway facilitates commands and file access, making it a focal point for exploitation.

The attack process is straightforward: a developer simply visits a compromised website. JavaScript on the site then opens a WebSocket connection to the local OpenClaw gateway. Because browsers don’t restrict cross-origin requests to loopback addresses, the script can proceed with brute-forcing the gateway password.

Once the script gains access, it registers itself as a trusted device, gaining admin-level control without alerting the user. This flaw stems from assumptions about localhost trustworthiness and inadequate rate limiting for loopback addresses.

Implications of the Vulnerability

With complete access, attackers can manipulate the AI agent, retrieve sensitive data, and execute commands. This is akin to a full system compromise initiated quietly from a browser window.

Oasis Security’s proof-of-concept highlighted these vulnerabilities, showcasing the ease with which an attacker could breach the system from a regular web session.

Recommended Mitigation Strategies

Developers are urged to promptly upgrade to OpenClaw version 2026.2.25 or later. Additionally, they should audit all OpenClaw installations, especially those that may exist outside of IT oversight.

Revoking unnecessary credentials and enforcing strict governance over AI agent identities are critical steps in safeguarding systems. These measures should parallel the security rigor applied to human users and service accounts.

The OpenClaw team responded swiftly, releasing a patch within 24 hours. Despite this, organizations must act quickly to ensure all systems are updated, given the tool’s widespread use and the potential for unpatched instances.

Stay informed with our cybersecurity updates by following us on Google News, LinkedIn, and X. Reach out to us for more insights or to contribute your stories.

Cyber Security News Tags:AI agents, AI security, Cybersecurity, developer tools, Oasis Security, Open Source, OpenClaw, security update, WebSocket, zero-click vulnerability

Post navigation

Previous Post: OpenClaw Security Flaw Allows AI Agent Hijacking

Related Posts

Critical SolarWinds Serv-U Vulnerabilities Let Attackers Execute Malicious Code Remotely as Admin Critical SolarWinds Serv-U Vulnerabilities Let Attackers Execute Malicious Code Remotely as Admin Cyber Security News
New Sicarii RaaS Operation Attacks Exposed RDP Services and Attempts to Exploit Fortinet Devices New Sicarii RaaS Operation Attacks Exposed RDP Services and Attempts to Exploit Fortinet Devices Cyber Security News
Popular Chrome Extension with Over 6 Million Installs Captures User Inputs to AI Chatbots Popular Chrome Extension with Over 6 Million Installs Captures User Inputs to AI Chatbots Cyber Security News
Active Directory Breach: Hackers Target NTDS.dit File Active Directory Breach: Hackers Target NTDS.dit File Cyber Security News
Jetflicks Illegal Paid Streaming Service Operators Jailed for 7 Years Jetflicks Illegal Paid Streaming Service Operators Jailed for 7 Years Cyber Security News
WatchGuard VPN Vulnerability Let Remote Attacker Execute Arbitrary Code WatchGuard VPN Vulnerability Let Remote Attacker Execute Arbitrary Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical OpenClaw Vulnerability Allows AI Agent Hijacking
  • OpenClaw Security Flaw Allows AI Agent Hijacking
  • Hackers Exploit Windows File Explorer for Malware Delivery
  • Canadian Tire Data Breach Exposes Millions of Accounts
  • Google Cloud API Key Exposure Risks Highlighted in New Study

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical OpenClaw Vulnerability Allows AI Agent Hijacking
  • OpenClaw Security Flaw Allows AI Agent Hijacking
  • Hackers Exploit Windows File Explorer for Malware Delivery
  • Canadian Tire Data Breach Exposes Millions of Accounts
  • Google Cloud API Key Exposure Risks Highlighted in New Study

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News