Warning: OpenClaw Gateway has a high-risk vulnerability. Please upgrade to version 2026.2.25 or later immediately.

PANews reported on March 2nd that the GoPlus Chinese community issued a warning about a high-risk vulnerability in the OpenClaw Gateway. Users are urged to immediately upgrade to version 2026.2.25 or higher and audit and revoke any unnecessary credentials, API keys, and node permissions granted to Agent instances. The analysis states that OpenClaw operates through a WebSocket Gateway bound to the local host. This Gateway, as the core coordination layer for the Agent, is a crucial component of OpenClaw. This attack targets a weakness in the Gateway layer, requiring only one condition: the user visits a malicious website controlled by the hacker in their browser.

The complete attack chain is as follows:

  • 1. The victim accessed a malicious website controlled by the attacker in their browser;
  • 2. The JavaScript in the page initiates a WebSocket connection to the OpenClaw gateway on the local host;
  • 3. Subsequently, the attack script attempts to brute-force the gateway password hundreds of times per second;
  • 4. After successful cracking, the attack script silently registers as a trusted device;
  • 5. The attacker gains administrator-level control over the Agent;
Share to:

Author: PA一线

This content is for market information only and is not investment advice.

Follow PANews official accounts, navigate bull and bear markets together