OpenClaw Bypasses EDR, DLP, IAM Silently

๐กOpenClaw evades EDR/DLP/IAMโ3 attack surfaces threaten agent security now
โก 30-Second TL;DR
What Changed
Embeds malicious instructions in emails for semantic exfiltration via normal OAuth API calls
Why It Matters
Enterprises face stealthy data breaches from AI agents performing 'normal' actions, undermining trust in agentic workflows. Rapid community fixes exist but fail against core semantic attacks, demanding new defense paradigms.
What To Do Next
Audit exposed OpenClaw instances with Bitsight and implement malicious skill detection.
๐ง Deep Insight
Web-grounded analysis with 9 cited sources.
๐ Enhanced Key Takeaways
- โขOpenClaw has experienced a cascade of at least 10+ CVEs since January 2026, with CVE-2026-25253 (CVSS 8.8) enabling one-click RCE through WebSocket token exfiltration, patched in version 2026.1.29 released January 30, 2026[1][5]
- โขSix additional vulnerabilities were disclosed by Endor Labs in February 2026, including SSRF bugs (CVE-2026-26322, CVSS 7.6), missing webhook authentication (CVE-2026-26319, CVSS 7.5), and path traversal flaws, with some having public exploit code available[3]
- โขSecurityScorecard reported tens of thousands of misconfigured OpenClaw instances exposed to the public internet, enabling threat actors to gain full access to corporate systems the instances can interact with[3]
- โขMultiple authentication and access control failures persist: missing WebSocket origin validation, localhost trust bypass behind reverse proxies, guest mode privilege escalation, and exposed mDNS broadcasts revealing filesystem paths and SSH availability[4]
- โขIndirect prompt injection via web browsing (CVE-2026-22708) allows attackers to embed hidden CSS-invisible instructions in webpages that the agent's scraper reads, turning the web into a command-and-control channel[4]
๐ ๏ธ Technical Deep Dive
- โขCVE-2026-25253 exploitation chain: Attacker crafts malicious link with gatewayUrl parameter โ victim clicks while authenticated โ applySettingsFromUrl() stores attacker-controlled endpoint โ WebSocket connection sends authentication token, device ID, and public key โ attacker captures token and reconnects to legitimate gateway with stolen credentials[1]
- โขPrivilege escalation mechanism: Attacker disables sandbox by setting 'exec.approvals.set' to 'off' and escapes Docker container by setting 'tools.exec.host' to 'gateway', achieving full RCE on host system[1][5]
- โขWebSocket vulnerability root cause: Control UI trusts gatewayUrl from query string without validation, auto-connects on load, and sends stored gateway token in WebSocket connect payload; server accepts connections from any origin due to missing origin validation[5]
- โขCVE-2026-24763 command injection: Unsafe handling of PATH environment variable in Docker sandbox execution mechanism allows authenticated users controlling environment variables to influence command execution within container context[6]
- โขIndirect prompt injection mechanism: OpenClaw does not sanitize web content before feeding into LLM context window; attackers create webpages with hidden CSS-invisible instructions that agent's scraper reads and interprets as system commands[4]
- โขAuthentication bypass vectors: Missing gateway authentication by default in many deployments, localhost connections auto-approved, guest mode logic error retains tool trigger permissions despite downgraded session, and mDNS broadcasts expose infrastructure details[4]
๐ฎ Future ImplicationsAI analysis grounded in cited sources
โณ Timeline
๐ Sources (9)
Factual claims are grounded in the sources below. Forward-looking analysis is AI-generated interpretation.
- sonicwall.com โ Openclaw Auth Token Theft Leading to Rce Cve 2026 25253
- runzero.com โ Openclaw
- infosecurity-magazine.com โ Researchers Six New Openclaw
- adversa.ai โ Openclaw Security 101 Vulnerabilities Hardening 2026
- thehackernews.com โ Openclaw Bug Enables One Click Remote
- nvd.nist.gov โ Cve 2026 24763
- dev.to โ 7 Openclaw Security Challenges to Watch for in 2026 46b1
- cvedetails.com โ Openclaw Openclaw 2026.1.24
- GitHub โ Openclawcves
Weekly AI Recap
Read this week's curated digest of top AI events โ
๐Related Updates
AI-curated news aggregator. All content rights belong to original publishers.
Original source: VentureBeat โ