OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.
https://www.securityweek.com/vulnerability-allows-hackers-to-hijack-openclaw-ai-assistant/
https://thehackernews.com/2026/02/openclaw-bug-enables-one-click-remote.html
https://x.com/0xacb/status/2016913750557651228
https://openclaw.ai/blog
https://github.com/openclaw/openclaw/security/advisories/GHSA-g8p2-7wf7-98mq
https://ethiack.com/news/blog/one-click-rce-moltbot
https://depthfirst.com/post/1-click-rce-to-steal-your-moltbot-data-and-keys
Source: Mitre, NVD
Published: 2026-02-01
Updated: 2026-02-13
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.00037