On February 14, 2026, a patch was released for a high-severity vulnerability, codenamed ClawJacked, in the popular OpenClaw AI agent. The flaw allowed a malicious website to hijack a developer's local OpenClaw agent instance via its WebSocket connection. By tricking a user into visiting a specially crafted webpage, an attacker could silently register a new device and gain control of the agent, enabling them to execute commands, manipulate its reasoning through prompt injection, and potentially exfiltrate data. The vulnerability was responsibly disclosed, and a fix was promptly made available in version 2026.2.13.
ClawJacked is a WebSocket hijacking vulnerability that exploits the trust relationship between the OpenClaw agent and local connections. The attack scenario is as follows:
ws://localhost:1337). This is a form of Cross-Site WebSocket Hijacking (CSWH).localhost. It would silently approve the new device registration from the malicious website's script without requiring user confirmation. This effectively gave the attacker's script control over the agent.An additional vector of abuse involved the agent's ability to read its own logs for troubleshooting. An attacker could potentially inject malicious content into the logs, which the agent would then process. This could be used for indirect prompt injection, manipulating the agent's behavior or tricking it into revealing sensitive information.
2026.2.13.2026.2.13.The impact of the ClawJacked vulnerability is severe for an affected developer:
| Type | Value | Description |
|---|---|---|
network_traffic_pattern |
WebSocket connections to localhost |
Monitor for unexpected WebSocket connections to local ports from browser processes, especially if the origin of the web page is an external domain. |
process_name |
openclaw-agent |
Monitor the agent process for unusual activity, such as accessing sensitive files or making outbound connections that are not part of its normal operation. |
log_source |
OpenClaw agent logs | Review agent logs for unexpected device registrations or commands being executed that were not initiated by the legitimate user. |
Detection:
openclaw-agent process for suspicious file access or network connections that result from malicious commands sent via the hijacked WebSocket.Response:
openclaw-agent process and the browser session.Immediate Action:
2026.2.13 or newer. This is a critical application of Software Update (D3-SU).Strategic Improvements:
localhost. The fix for ClawJacked likely involved implementing a proper Origin header check to ensure that WebSocket connections can only be initiated from trusted, whitelisted web pages, not arbitrary ones. This is a form of Application Configuration Hardening (D3-ACH).New patch version 2026.2.25 released for 'ClawJacked' vulnerability in OpenClaw AI agent, explicitly addressing password bypass via WebSocket hijacking.
Further details have emerged regarding the 'ClawJacked' vulnerability in the OpenClaw AI agent. A new patch, version 2026.2.25, has been released, superseding the previously mentioned version. This update explicitly clarifies that the flaw allows malicious websites to bypass password protection when hijacking a local AI agent via WebSocket. The vulnerability was publicly disclosed by Oasis Security, highlighting the critical need for users to update to the latest patched version to prevent unauthorized control and potential data exfiltration from connected enterprise systems.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats