Skip to content

Commit 7fccdfe

Browse files
1 parent 5543d5c commit 7fccdfe

2 files changed

Lines changed: 129 additions & 0 deletions

File tree

Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-g8p2-7wf7-98mq",
4+
"modified": "2026-02-02T23:41:05Z",
5+
"published": "2026-02-02T23:41:05Z",
6+
"aliases": [
7+
"CVE-2026-25253"
8+
],
9+
"summary": "OpenClaw/Clawdbot has 1-Click RCE via Authentication Token Exfiltration From gatewayUrl",
10+
"details": "## Summary\n\nThe Control UI trusts `gatewayUrl` from the query string without validation and auto-connects on load, sending the stored gateway token in the WebSocket connect payload.\n\nClicking a crafted link or visiting a malicious site can send the token to an attacker-controlled server. The attacker can then connect to the victim's local gateway, modify config (sandbox, tool policies), and invoke privileged actions, achieving 1-click RCE. This vulnerability is exploitable even on instances configured to listen on loopback only, since the victim's browser initiates the outbound connection.\n\n## Details\n\nThe root cause is the lack of validation for `gatewayUrl` combined with auto‑connect behavior on page load. With the change users now need to confirm the new gateway URL in the UI.\n\n## Impact\n\nThis is a token exfiltration vulnerability that leads to full gateway compromise. It impacts any Moltbot deployment where a user has authenticated to the Control UI. The attacker gains operator-level access to the gateway API, enabling arbitrary config changes and code execution on the gateway host. The attack works even when the gateway binds to loopback because the victim's browser acts as the bridge.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "clawdbot"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "2026.1.29"
32+
}
33+
]
34+
}
35+
],
36+
"database_specific": {
37+
"last_known_affected_version_range": "<= 2026.1.28"
38+
}
39+
}
40+
],
41+
"references": [
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-g8p2-7wf7-98mq"
45+
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25253"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://depthfirst.com/post/1-click-rce-to-steal-your-moltbot-data-and-keys"
53+
},
54+
{
55+
"type": "PACKAGE",
56+
"url": "https://github.com/openclaw/openclaw"
57+
},
58+
{
59+
"type": "WEB",
60+
"url": "https://openclaw.ai/blog"
61+
}
62+
],
63+
"database_specific": {
64+
"cwe_ids": [
65+
"CWE-668"
66+
],
67+
"severity": "HIGH",
68+
"github_reviewed": true,
69+
"github_reviewed_at": "2026-02-02T23:41:05Z",
70+
"nvd_published_at": null
71+
}
72+
}
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-q284-4pvr-m585",
4+
"modified": "2026-02-02T23:41:35Z",
5+
"published": "2026-02-02T23:41:35Z",
6+
"aliases": [
7+
"CVE-2026-25157"
8+
],
9+
"summary": "OpenClaw/Clawdbot has OS Command Injection via Project Root Path in sshNodeCommand",
10+
"details": "Two related vulnerabilities existed in the macOS application's SSH remote connection handling (`CommandResolver.swift`):\n\n## Details\n\nThe `sshNodeCommand` function constructed a shell script without properly escaping the user-supplied project path in an error message. When the `cd` command failed, the unescaped path was interpolated directly into an `echo` statement, allowing arbitrary command execution **on the remote SSH host**.\n\nThe `parseSSHTarget` function did not validate that SSH target strings could not begin with a dash. An attacker-supplied target like `-oProxyCommand=...` would be interpreted as an SSH configuration flag rather than a hostname, allowing arbitrary command execution **on the local machine**.\n\n## Impact\n\nAn attacker who can influence a user's remote connection settings (via social engineering or malicious configuration) could achieve arbitrary code execution on either the user's local machine or their configured remote SSH host, depending on which input vector is exploited.\n\n**Affected component:** macOS menubar application (Remote/SSH mode only)\n\n**Not affected:** CLI (`npm install openclaw`), web gateway, iOS/Android apps, or users running in Local mode.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "clawdbot"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "2026.1.29"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-q284-4pvr-m585"
42+
},
43+
{
44+
"type": "PACKAGE",
45+
"url": "https://github.com/openclaw/openclaw"
46+
}
47+
],
48+
"database_specific": {
49+
"cwe_ids": [
50+
"CWE-78"
51+
],
52+
"severity": "HIGH",
53+
"github_reviewed": true,
54+
"github_reviewed_at": "2026-02-02T23:41:35Z",
55+
"nvd_published_at": null
56+
}
57+
}

0 commit comments

Comments
 (0)