{"id":46655,"date":"2026-03-02T11:51:25","date_gmt":"2026-03-02T11:51:25","guid":{"rendered":"https:\/\/agooka.com\/news\/technologies\/clawjacked-flaw-lets-malicious-sites-hijack-openclaw-steal-data\/"},"modified":"2026-03-02T11:51:25","modified_gmt":"2026-03-02T11:51:25","slug":"clawjacked-flaw-lets-malicious-sites-hijack-openclaw-steal-data","status":"publish","type":"post","link":"https:\/\/agooka.com\/news\/technologies\/clawjacked-flaw-lets-malicious-sites-hijack-openclaw-steal-data\/","title":{"rendered":"ClawJacked flaw lets malicious sites hijack OpenClaw, steal data"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/dataconomy.com\/wp-content\/uploads\/2026\/03\/UH-Manoa-students-develop-algorithm-to-trace-neutrino-origins.jpg\" alt=\"ClawJacked flaw lets malicious sites hijack OpenClaw, steal data\" title=\"ClawJacked flaw lets malicious sites hijack OpenClaw, steal data\"\/><\/p>\n<p>A vulnerability named ClawJacked lets malicious websites hijack the OpenClaw AI platform.<\/p>\n<p>The flaw enables attackers to brute\u2011force the local gateway password from a browser, gain admin control, and exfiltrate data, raising severe risk for enterprises using OpenClaw.<\/p>\n<p>Oasis Security discovered the issue and reported it to OpenClaw. OpenClaw released a patch in version 2026.2.26 on February 26.<\/p>\n<p>The OpenClaw gateway binds to localhost and exposes a WebSocket interface. Browser cross\u2011origin policies do not block WebSocket connections to localhost, allowing a visited site to open a connection silently.<\/p>\n<p>OpenClaw exempts the loopback address from rate limiting. The gateway accepts unlimited authentication attempts from local JavaScript.<\/p>\n<p>The gateway does not log failed authentication attempts from localhost. This omission prevents operators from detecting brute\u2011force activity. In our lab testing, we achieved a sustained rate of hundreds of password guesses per second from browser JavaScript alone,\u201d said Oasis.<\/p>\n<p>At that speed, a list of common passwords is exhausted in under a second, and a large dictionary would take only minutes. A human\u2011chosen password doesn\u2019t stand a chance,\u201d said Oasis.<\/p>\n<p>After a successful login, the attacker can register as a trusted device without user confirmation. The gateway automatically approves device pairings from the loopback address.<\/p>\n<p>An attacker can therefore register a trusted device without prompting the user. The attacker can then dump credentials, list connected nodes, read logs, and execute shell commands on paired devices. Such actions can expose messaging histories, steal files, and compromise workstations from a single browser tab.<\/p>\n<p>Oasis published a proof\u2011of\u2011concept video that shows data theft via the OpenClaw vulnerability. The patch tightens WebSocket security checks and re\u2011enables rate limiting for localhost connections. The fix adds additional protections to prevent attackers from abusing localhost loopback connections to brute\u2011force logins or hijack sessions.<\/p>\n<p>OpenClaw recommends that users update to version 2026.2.26 or later immediately.<\/p>\n<p>OpenClaw addressed the flaw within 24 hours of disclosure. The rapid response limited exposure for affected installations. Organizations running OpenClaw should apply the update without delay to prevent hijacking. Oasis Security classified the vulnerability as high severity.<\/p>\n<p>The rating reflects the potential for full system compromise. OpenClaw\u2019s popularity stems from its self\u2011hosted design and support for multi\u2011platform task automation.<\/p>\n<p>The platform\u2019s flexibility has driven rapid adoption among developers and enterprises. OpenClaw is a self\u2011hosted AI platform that allows agents to send messages, execute commands, and manage tasks across multiple services.<\/p>\n<p><a href=\"https:\/\/www.oasis.security\/blog\/openclaw-vulnerability\" rel=\"noreferrer\" target=\"_blank\"><strong>Featured image credit<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A vulnerability named ClawJacked lets malicious websites hijack the OpenClaw AI platform. The flaw enables attackers to brute\u2011force the local gateway password from a browser, gain admin control, and exfiltrate data, raising severe risk for enterprises using OpenClaw. Oasis Security discovered the issue and reported it to OpenClaw. OpenClaw released a patch in version 2026.2.26 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":46656,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37],"tags":[],"class_list":{"0":"post-46655","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technologies"},"_links":{"self":[{"href":"https:\/\/agooka.com\/news\/wp-json\/wp\/v2\/posts\/46655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/agooka.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/agooka.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/agooka.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/agooka.com\/news\/wp-json\/wp\/v2\/comments?post=46655"}],"version-history":[{"count":0,"href":"https:\/\/agooka.com\/news\/wp-json\/wp\/v2\/posts\/46655\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/agooka.com\/news\/wp-json\/wp\/v2\/media\/46656"}],"wp:attachment":[{"href":"https:\/\/agooka.com\/news\/wp-json\/wp\/v2\/media?parent=46655"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/agooka.com\/news\/wp-json\/wp\/v2\/categories?post=46655"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/agooka.com\/news\/wp-json\/wp\/v2\/tags?post=46655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}