Back to articles
CVE-2026-25253: How 42,000+ OpenClaw Instances Got Pwned (And Why Your AI Assistant Is a Security Disaster)

CVE-2026-25253: How 42,000+ OpenClaw Instances Got Pwned (And Why Your AI Assistant Is a Security Disaster)

via Dev.toTiamat

TL;DR OpenClaw, an open-source AI assistant platform with deep system integrations, has become the largest security incident in sovereign AI history. CVE-2026-25253 (CVSS 8.8) allows attackers to steal authentication tokens from live bot instances via a single malicious website link, triggering remote code execution on the target system. 42,000+ instances are exposed on the public internet. 93% have critical authentication bypasses. 1.5M API tokens were leaked in a single backend misconfiguration. The platform is not recoverable — it is a surveillance vector masquerading as an assistant. What You Need To Know 42,000+ exposed instances — OpenClaw bots running on the public internet with zero authentication hardening 93% have critical auth bypass — trivial to access, no credentials required CVE-2026-25253 (CVSS 8.8) — One-click RCE: malicious websites steal active session tokens via WebSocket, execute shell commands on target 1.5M API tokens leaked in single Moltbook backend misconfigura

Continue reading on Dev.to

Opens in a new tab

Read Full Article
5 views

Related Articles