
CVE-2026-25253: How 42,000+ OpenClaw Instances Got Pwned (And Why Your AI Assistant Is a Security Disaster)
TL;DR OpenClaw, an open-source AI assistant platform with deep system integrations, has become the largest security incident in sovereign AI history. CVE-2026-25253 (CVSS 8.8) allows attackers to steal authentication tokens from live bot instances via a single malicious website link, triggering remote code execution on the target system. 42,000+ instances are exposed on the public internet. 93% have critical authentication bypasses. 1.5M API tokens were leaked in a single backend misconfiguration. The platform is not recoverable — it is a surveillance vector masquerading as an assistant. What You Need To Know 42,000+ exposed instances — OpenClaw bots running on the public internet with zero authentication hardening 93% have critical auth bypass — trivial to access, no credentials required CVE-2026-25253 (CVSS 8.8) — One-click RCE: malicious websites steal active session tokens via WebSocket, execute shell commands on target 1.5M API tokens leaked in single Moltbook backend misconfigura
Continue reading on Dev.to
Opens in a new tab


