OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.
References
| Link | Resource |
|---|---|
| https://depthfirst.com/post/1-click-rce-to-steal-your-moltbot-data-and-keys | Exploit Third Party Advisory |
| https://ethiack.com/news/blog/one-click-rce-moltbot | Exploit Third Party Advisory |
| https://github.com/openclaw/openclaw/security/advisories/GHSA-g8p2-7wf7-98mq | Vendor Advisory |
| https://openclaw.ai/blog | Product |
| https://x.com/0xacb/status/2016913750557651228 | Exploit |
| https://depthfirst.com/post/1-click-rce-to-steal-your-moltbot-data-and-keys | Exploit Third Party Advisory |
Configurations
History
13 Feb 2026, 17:41
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Openclaw openclaw
Openclaw |
|
| References | () https://depthfirst.com/post/1-click-rce-to-steal-your-moltbot-data-and-keys - Exploit, Third Party Advisory | |
| References | () https://ethiack.com/news/blog/one-click-rce-moltbot - Exploit, Third Party Advisory | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-g8p2-7wf7-98mq - Vendor Advisory | |
| References | () https://openclaw.ai/blog - Product | |
| References | () https://x.com/0xacb/status/2016913750557651228 - Exploit | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* |
03 Feb 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://depthfirst.com/post/1-click-rce-to-steal-your-moltbot-data-and-keys - |
02 Feb 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
01 Feb 2026, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-01 23:15
Updated : 2026-02-13 17:41
NVD link : CVE-2026-25253
Mitre link : CVE-2026-25253
CVE.ORG link : CVE-2026-25253
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-669
Incorrect Resource Transfer Between Spheres
