VulnerabilitiesHIGH

OpenClaw Flaw Exposes AI Agents to Malicious Hijacking

THThe Hacker News19h ago2 min read
OpenClawWebSocketOasisAI Security
馃幆

Basically, a security flaw lets bad websites control your AI agents.

Quick Summary

A critical flaw in OpenClaw could let malicious sites control your AI agents. Users are at risk of privacy breaches and unauthorized access. Stay alert and update your software as soon as a fix is available.

What Happened

A serious security flaw has been discovered in OpenClaw?, a popular AI agent platform. This vulnerability could allow malicious websites to hijack local AI agents through a technology called WebSocket?. This means that if you visit a harmful site, it could potentially take control of your AI agent without your knowledge.

The problem lies in the core system of OpenClaw? itself, not in any third-party plugins or extensions. This makes the flaw particularly concerning because it affects the basic setup of the software as it is intended to run. The developers, Oasis, have acknowledged the issue and are working to fix it, but the window for exploitation could be significant if users do not take immediate action.

Why Should You Care

Imagine your AI assistant suddenly acting against your wishes because a malicious? site took control. This could lead to unauthorized access to your personal information, or worse, manipulation of your AI's functions. If you use OpenClaw, your privacy and security are at risk.

Every time you browse the internet, you expose yourself to potential threats. Just like leaving your front door unlocked, visiting unsafe websites can let intruders in. With this vulnerability?, your AI agent becomes a target, and you need to be aware of the risks it poses to your data and privacy.

What's Being Done

Oasis is actively working on a patch to address this vulnerability?. Here are some steps you should take right now:

  • Update OpenClaw to the latest version as soon as the patch is released.
  • Avoid visiting untrusted websites until the fix is confirmed.
  • Monitor your AI agent's behavior for any unusual activity.

Experts are keeping a close eye on how quickly users adopt the patch and whether any malicious? actors exploit this vulnerability? before it is resolved.

馃挕 Tap dotted terms for explanations

馃敀 Pro insight: The exploitation of this vulnerability highlights the need for robust security measures in AI agent frameworks.

Original article from

The Hacker News

Read Full Article

Related Pings

HIGHVulnerabilities

GIMP Faces Critical Vulnerability: Urgent Fix Needed

A critical vulnerability in GIMP was just reported, putting users at risk. With a CVSS score of 7.8, this flaw could allow unauthorized access to your files. The vendor has until July 3 to issue a fix. Stay alert and back up your work!

ZDI Upcoming AdvisoriesJust now2m
HIGHVulnerabilities

Pwn2Own Automotive 2026: $1 Million in Vulnerabilities Uncovered!

In a thrilling conclusion to Pwn2Own Automotive 2026, hackers uncovered over 76 vulnerabilities, earning $1 million in prizes. This competition highlights the urgent need for robust automotive security. Stay alert for updates from your vehicle manufacturer to ensure your safety on the road.

Zero Day Initiative BlogJust now2m
HIGHVulnerabilities

Pwn2Own Automotive 2026: Record Entries for Epic Hacking Showdown

The Pwn2Own Automotive competition has kicked off in Tokyo with 73 teams competing to exploit car systems. This event is crucial for improving vehicle security. Stay informed about the vulnerabilities that could impact your safety on the road!

Zero Day Initiative Blog1m ago2m
HIGHVulnerabilities

AI Revolutionizes Vulnerability Discovery in Cybersecurity

Anthropic's Claude Opus 4.6 has discovered 500 high-severity vulnerabilities. This impacts developers and security teams alike. Without proper context, more alerts can overwhelm security efforts. Organizations must prioritize AI-driven exposure management to stay secure.

Tenable Blog1m ago2m
HIGHVulnerabilities

Dynamic Objects: The Hidden Threat in Active Directory

Dynamic objects in Active Directory pose a stealthy threat by self-deleting without leaving evidence. This impacts organizations by complicating forensic investigations. Security teams are urged to implement real-time monitoring to catch these attacks before they erase all traces.

Tenable Blog1m ago2m
HIGHVulnerabilities

New Cyber Module Boosts Health Organizations' Risk Planning

A new cybersecurity module has been launched to help healthcare organizations better prepare for cyber threats. Hospitals are particularly concerned about risks from cloud services and connected devices. This initiative aims to protect patient care and sensitive health data. Organizations are encouraged to implement the new toolkit immediately.

Help Net Security1m ago2m