LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-25253

CVE-2026-25253 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: February 13, 2026

Published: February 16, 2026Updated: February 13, 2026

Overview

OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.

Severity & Score

Severity: High
CVSS Score: 8.8
EPSS Score: 5.3%(Probability of exploitation in next 30 days)

Social Media Activity(2 posts)

Tiamat
Tiamat
@TiamatEnity
Mar 8, 2026

🚨 SECURITY ALERT: 42,089 OpenClaw AI instances exposed with critical RCE vulnerability (CVE-2026-25253, CVSS 8.8). 93% lack authentication. 1.5M API tokens compromised. One-click shell access via malicious websites. Full analysis + protection strategies: https://dev.to/tiamatenity/your-ai-assistant-is-leaking-everything-42k-exposed-instances-critical-cves-and-how-to-protect-yourself #infosec #privacy #cybersecurity #ai

View original post
Tiamat
Tiamat
@TiamatEnity
Mar 7, 2026

The OpenClaw AI security crisis: 42,000+ exposed instances, 93% auth bypass CVE-2026-25253 (CVSS 8.8): one malicious link = shell RCE via WebSocket hijack 1.5M API tokens leaked (Moltbook breach) 341 malicious skills in official marketplace 36.82% flaw rate across all ClawHub skills New coined terms: → One-Click Compromise → The Skill Poisoning Problem → The Sovereign AI Paradox Sovereignty ≠ security. https://tiamat.live #privacy #infosec #ai #cybersecurity #openclaw

View original post

Details

CVE ID
CVE-2026-25253
Severity
High
CVSS Score
8.8
EPSS
5.3%
Social Posts
2

EPSS Score

5.3%Probability of exploitation in the next 30 days