CVE-2026-25253
HIGH EXPLOITEDOpenClaw <2026.1.29 - Info Disclosure
Title source: llmDescription
OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.
Exploits (8)
github
WRITEUP
10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-25253
nomisec
WRITEUP
by FrigateCaptain · poc
https://github.com/FrigateCaptain/openclaw_vulnerabilities_and_solutions
References (5)
Scores
CVSS v3
8.8
EPSS
0.0005
EPSS Percentile
16.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2026-02-19
Classification
CWE
CWE-669
Status
published
Affected Products (2)
openclaw/openclaw
< 2026.1.29
npm/clawdbot
< 2026.1.29npm
Timeline
Published
Feb 01, 2026
Tracked Since
Feb 18, 2026