ClawJacked attack let malicious websites hijack OpenClaw to steal data
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要特定的开头。首先,我得仔细阅读这篇文章,理解主要内容。 文章讲的是一个叫做“ClawJacked”的高危漏洞,存在于OpenClaw这个AI代理中。这个漏洞允许恶意网站无声地暴力破解访问本地运行的实例并控制它。Oasis Security发现了这个问题,并报告给了OpenClaw,修复版本已经发布了。 接下来,我需要提取关键信息:漏洞名称、影响、发现者、修复情况以及漏洞的工作原理。然后,把这些信息浓缩到100字以内。 要注意不要使用“文章内容总结”这样的开头,直接描述内容。同时,保持语言简洁明了。 可能的结构是:介绍漏洞名称和影响,说明发现者和修复情况,最后提到漏洞如何被利用。这样既全面又简洁。 现在,把这些点组织成一句话或几句话,确保不超过100字。 </think> 安全研究人员披露了AI代理OpenClaw中的高危漏洞"ClawJacked",该漏洞允许恶意网站通过WebSocket接口暴力破解本地实例并控制其管理权限。修复版本已发布以加强WebSocket安全防护。 2026-3-1 22:0:18 Author: www.bleepingcomputer.com(查看原文) 阅读量:11 收藏

OpenClaw

Security researchers have disclosed a high-severity vulnerability dubbed "ClawJacked" in the popular AI agent OpenClaw that allowed a malicious website to silently bruteforce access to a locally running instance and take control over it.

Oasis Security discovered the issue and reported it to OpenClaw, with a fix being released in version 2026.2.26 on February 26.

OpenClaw is a self-hosted AI platform that has recently surged in popularity for enabling AI agents to autonomously send messages, execute commands, and manage tasks across multiple platforms.

According to Oasis Security, the vulnerability is caused by the OpenClaw gateway service binding to localhost by default and exposing a WebSocket interface.

Because browser cross-origin policies do not block WebSocket connections to localhost, a malicious website visited by an OpenClaw user can use JavaScript to silently open a connection to the local gateway and attempt authentication without triggering any warnings.

While OpenClaw includes rate limiting to prevent brute-force attacks, the loopback address (127.0.0.1) is exempt by default, so local CLI sessions are not mistakenly locked out.

The researchers found that they could brute-force the OpenClaw management password at hundreds of attempts per second without failed attempts being throttled or logged. Once the correct password is guessed, the attacker can silently register as a trusted device, as the gateway automatically approves device pairings from localhost without requiring user confirmation.

"In our lab testing, we achieved a sustained rate of hundreds of password guesses per second from browser JavaScript alone," explains Oasis.

"At that speed, a list of common passwords is exhausted in under a second, and a large dictionary would take only minutes. A human-chosen password doesn't stand a chance."

With an authenticated session and admin permissions, the attacker can now interact directly with the AI platform, dumping credentials, listing connected nodes, stealing credentials, and reading application logs.

Oasis says this could allow an attacker to instruct the agent to search messaging histories for sensitive information, exfiltrate files from connected devices, or execute arbitrary shell commands on paired nodes, effectively resulting in full workstation compromise triggered from a browser tab.

Oasis shared a demonstration of this attack, showing how it could be used to steal sensitive data through the OpenClaw vulnerability.

Oasis reported the issue to OpenClaw, including technical details and proof-of-concept code, and it was fixed within 24 hours of disclosure.

The fix tightens WebSocket security checks and adds additional protections to prevent attackers from abusing localhost loopback connections to brute-force logins or hijack sessions, even if those connections are configured to be exempt from rate limiting.

Organizations and developers running OpenClaw should update to version 2026.2.26 or later immediately to prevent their installations from being hijacked.

With OpenClaw's massive popularity, security researchers have been focusing on identifying vulnerabilities and attacks targeting the platform.

Threat actors have been seen abusing the "ClawHub" OpenClaw skills repository to promote malicious skills that deploy infostealing malware or trick users into running malicious commands on their devices.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/clawjacked-attack-let-malicious-websites-hijack-openclaw-to-steal-data/
如有侵权请联系:admin#unsafe.sh