Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»ClawJacked attack let malicious websites hijack OpenClaw to steal data
    Cybersecurity

    ClawJacked attack let malicious websites hijack OpenClaw to steal data

    adminBy adminMarch 1, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    OpenClaw
    Share
    Facebook Twitter LinkedIn Pinterest Email

    OpenClaw

    Security researchers have disclosed a high-severity vulnerability dubbed “ClawJacked” in the popular AI agent OpenClaw that allowed a malicious website to silently bruteforce access to a locally running instance and take control over it.

    Oasis Security discovered the issue and reported it to OpenClaw, with a fix being released in version 2026.2.26 on February 26.

    OpenClaw is a self-hosted AI platform that has recently surged in popularity for enabling AI agents to autonomously send messages, execute commands, and manage tasks across multiple platforms.

    According to Oasis Security, the vulnerability is caused by the OpenClaw gateway service binding to localhost by default and exposing a WebSocket interface.

    Because browser cross-origin policies do not block WebSocket connections to localhost, a malicious website visited by an OpenClaw user can use JavaScript to silently open a connection to the local gateway and attempt authentication without triggering any warnings.

    While OpenClaw includes rate limiting to prevent brute-force attacks, the loopback address (127.0.0.1) is exempt by default, so local CLI sessions are not mistakenly locked out.

    The researchers found that they could brute-force the OpenClaw management password at hundreds of attempts per second without failed attempts being throttled or logged. Once the correct password is guessed, the attacker can silently register as a trusted device, as the gateway automatically approves device pairings from localhost without requiring user confirmation.

    “In our lab testing, we achieved a sustained rate of hundreds of password guesses per second from browser JavaScript alone,” explains Oasis.

    “At that speed, a list of common passwords is exhausted in under a second, and a large dictionary would take only minutes. A human-chosen password doesn’t stand a chance.”

    With an authenticated session and admin permissions, the attacker can now interact directly with the AI platform, dumping credentials, listing connected nodes, stealing credentials, and reading application logs.

    Oasis says this could allow an attacker to instruct the agent to search messaging histories for sensitive information, exfiltrate files from connected devices, or execute arbitrary shell commands on paired nodes, effectively resulting in full workstation compromise triggered from a browser tab.

    Oasis shared a demonstration of this attack, showing how it could be used to steal sensitive data through the OpenClaw vulnerability.

    Oasis reported the issue to OpenClaw, including technical details and proof-of-concept code, and it was fixed within 24 hours of disclosure.

    The fix tightens WebSocket security checks and adds additional protections to prevent attackers from abusing localhost loopback connections to brute-force logins or hijack sessions, even if those connections are configured to be exempt from rate limiting.

    Organizations and developers running OpenClaw should update to version 2026.2.26 or later immediately to prevent their installations from being hijacked.

    With OpenClaw’s massive popularity, security researchers have been focusing on identifying vulnerabilities and attacks targeting the platform.

    Threat actors have been seen abusing the “ClawHub” OpenClaw skills repository to promote malicious skills that deploy infostealing malware or trick users into running malicious commands on their devices.


    tines

    Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

    Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

    Attack ClawJacked data Hijack Malicious OpenClaw steal websites
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleBest High-Yield Savings Accounts for March 2026
    Next Article Premium Android tablets make a comeback with Lenovo’s Idea Tab Pro and Legion Tab
    admin
    • Website

    Related Posts

    IPFire ships its 200th core update with a new domain blocklist and kernel upgrade

    March 2, 2026

    Iran-linked hackers raise threat level against US, allies

    March 2, 2026

    UK warns of Iranian cyberattack risks amid Middle-East conflict

    March 2, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    5 custom ROMs that prove Android used to be more fun

    March 2, 2026

    IPFire ships its 200th core update with a new domain blocklist and kernel upgrade

    March 2, 2026

    38% of AI Overview Citations Pull From Top 10 Pages

    March 2, 2026

    The man who built an operating system for God and then lost everything

    March 2, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (560)
    • Privacy & Online Earning (75)
    • SEO & Digital Marketing (348)
    • Tech Tools & Mobile / Apps (696)
    • WiFi / Internet & Networking (100)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    5 custom ROMs that prove Android used to be more fun

    March 2, 2026

    IPFire ships its 200th core update with a new domain blocklist and kernel upgrade

    March 2, 2026

    38% of AI Overview Citations Pull From Top 10 Pages

    March 2, 2026
    Most Popular
    • 5 custom ROMs that prove Android used to be more fun
    • IPFire ships its 200th core update with a new domain blocklist and kernel upgrade
    • 38% of AI Overview Citations Pull From Top 10 Pages
    • The man who built an operating system for God and then lost everything
    • Iran-linked hackers raise threat level against US, allies
    • National Book Tour for Cindy Cohn’s Memoir, ‘Privacy’s Defender’
    • Information Retrieval Part 4 (Sigh): Grounding & RAG
    • discovery+ | Stream TV Shows 20.16.0.68 by Discovery Communications LLC
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.