OpenClaw Security Fix: CVE-2026-25253 One‑Click RCE

What happened, who’s affected, and how to harden

OpenClaw Security Advisory

A high‑severity flaw (CVE0265253, CVSS 8.8) enabled a one‑click remote code execution chain via a crafted link. It was fixed in 2026.1.29 (released Jan 30, 2026). If you run OpenClaw, upgrade and rotate credentials immediately.

What actually went wrong

The Control UI trusted a gatewayUrl from the query string and auto‑connected on load, sending the stored gateway token in the WebSocket connect payload. Combined with a missing WebSocket Origin validation, a malicious page could steal the token and connect to your local gateway—even when bound to loopback—because your browser bridges the request.

Attack chain in plain English

Token Exfil

Victim visits a crafted link; UI auto‑connects and leaks the gateway token to attacker‑controlled endpoint.

Origin Bypass

Gateway accepts WebSocket connections without origin checks; attacker reuses the token to log in remotely.

Privilege Abuse

With operator scopes, attacker flips settings (approvals off, tools exec to host) and invokes commands.

Who was affected

Any deployment where a user had authenticated to the Control UI. Loopback‑only bindings did not help, because exploitation piggybacked on the victim’s browser. The impact was operator‑level access and arbitrary code execution on the gateway host.

Fix timeline

The maintainer shipped a fix in 2026.1.29 (Jan 30, 2026). If you are on an older build, you are vulnerable. Upgrade first, then remediate configuration and credentials.

Immediate actions for operators

1) Upgrade now

# Example
openclaw update
openclaw version

Confirm you are on 2026.1.29 or later.

2) Rotate tokens and review scopes

Regenerate gateway tokens and minimize operator scopes. Audit who/what holds tokens and where they are stored.

3) Reinstate safe defaults

  • Set approvals back to on for privileged actions.
  • Restore tool execution to containerized mode; avoid tools.exec.host: "gateway" unless justified.
  • Disable any query‑string auto‑connect behavior in UI settings.

4) Operational hygiene

  • Logout of Control UI when not in use; prefer separate browser profiles.
  • Avoid visiting untrusted pages while logged into the UI.
  • Review gateway logs for suspicious config flips or command invocations.

Defensive configuration that helps

Developer remediation checklist

Validate Origins

Enforce WebSocket Origin checks and explicit host/port allowlists.

Kill Auto‑Connect

Remove query‑string auto‑connect; require deliberate user initiation and re‑auth for privileged ops.

Scope Minimization

Design tokens with least privilege; add per‑route checks for sensitive config changes.

Secure Defaults

Approvals on by default, execution inside sandbox, and explicit escape only with warnings and audit.

Perspective: guardrails vs. reality

Safety controls designed to contain LLM prompt injection don’t automatically defend against UI token exfiltration. Treat the UI like any high‑privilege admin surface: validate origins, constrain tokens, demand explicit user action, and log everything.

Upgrade and Harden Today

Move to 2026.1.29+, rotate tokens, and reinstate safe defaults. Then audit logs and policies.