CVE-2026-25253

HIGH EXPLOITED

OpenClaw <2026.1.29 - Info Disclosure

Title source: llm

Description

OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.

Exploits (8)

nomisec WORKING POC 72 stars
by ethiack · infoleak
https://github.com/ethiack/moltbot-1click-rce
github WRITEUP 10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-25253
nomisec SCANNER 8 stars
by adibirzu · poc
https://github.com/adibirzu/openclaw-security-monitor
nomisec WORKING POC
by al4n4n · client-side
https://github.com/al4n4n/CVE-2026-25253-research
nomisec WRITEUP
by Joseph19820124 · poc
https://github.com/Joseph19820124/openclaw-vuln-report
nomisec WORKING POC
by EQSTLab · poc
https://github.com/EQSTLab/CVE-2026-25253
nomisec WRITEUP
by Ckokoski · poc
https://github.com/Ckokoski/moatbot-security
nomisec WRITEUP
by FrigateCaptain · poc
https://github.com/FrigateCaptain/openclaw_vulnerabilities_and_solutions

Scores

CVSS v3 8.8
EPSS 0.0005
EPSS Percentile 16.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2026-02-19

Classification

CWE
CWE-669
Status published

Affected Products (2)

openclaw/openclaw < 2026.1.29
npm/clawdbot < 2026.1.29npm

Timeline

Published Feb 01, 2026
Tracked Since Feb 18, 2026