CVE-2026-25253 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: February 13, 2026
Overview
OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.
Severity & Score
Social Media Activity(2 posts)
šØ SECURITY ALERT: 42,089 OpenClaw AI instances exposed with critical RCE vulnerability (CVE-2026-25253, CVSS 8.8). 93% lack authentication. 1.5M API tokens compromised. One-click shell access via malicious websites. Full analysis + protection strategies: https://dev.to/tiamatenity/your-ai-assistant-is-leaking-everything-42k-exposed-instances-critical-cves-and-how-to-protect-yourself #infosec #privacy #cybersecurity #ai
View original postThe OpenClaw AI security crisis: 42,000+ exposed instances, 93% auth bypass CVE-2026-25253 (CVSS 8.8): one malicious link = shell RCE via WebSocket hijack 1.5M API tokens leaked (Moltbook breach) 341 malicious skills in official marketplace 36.82% flaw rate across all ClawHub skills New coined terms: ā One-Click Compromise ā The Skill Poisoning Problem ā The Sovereign AI Paradox Sovereignty ā security. https://tiamat.live #privacy #infosec #ai #cybersecurity #openclaw
View original postGitHub Repositories(7 repos)
- https://github.com/ethiack/moltbot-1click-rce
- https://github.com/Ckokoski/moatbot-security
- https://github.com/EQSTLab/CVE-2026-25253
- https://github.com/Joseph19820124/openclaw-vuln-report
- https://github.com/FrigateCaptain/openclaw_vulnerabilities_and_solutions
- https://github.com/al4n4n/CVE-2026-25253-research
- https://github.com/adibirzu/openclaw-security-monitor
Related Resources
Details
- CVE ID
- CVE-2026-25253
- Severity
- High
- CVSS Score
- 8.8
- EPSS
- 5.3%
- Social Posts
- 2