On February 14, 2026, a critical vulnerability was disclosed in the OpenClaw AI Agent Framework, a highly popular open-source project. The vulnerability, tracked as CVE-2026-25253, is a zero-click Remote Code Execution (RCE) flaw. This allows a remote, unauthenticated attacker to execute arbitrary code on a machine running the OpenClaw agent, potentially leading to a full system compromise without any action required from the user. This high-severity issue exacerbates an already challenging period for the project, which has recently been battling a deluge of malicious plugins on its ClawHub marketplace and saw its founder depart for OpenAI.
CVE-2026-25253 is classified as a zero-click RCE. While the exact technical mechanism was not detailed in the source articles, this classification implies that an attacker can trigger the vulnerability remotely simply by sending specially crafted data to an exposed OpenClaw agent instance. No user interaction, such as clicking a link or opening a file, is required. This makes the vulnerability wormable, meaning malware could be created to automatically scan for and infect vulnerable OpenClaw instances across the internet.
The attack vector likely involves an un-sandboxed or improperly validated input in a network-facing component of the AI agent, allowing an attacker to achieve code execution in the context of the user running the agent. Given the nature of AI agents, which often have high privileges to interact with the operating system, a successful exploit could grant an attacker complete control over the developer's machine.
The articles do not confirm active exploitation in the wild, but given the severity and zero-click nature of CVE-2026-25253, security teams must assume that exploitation will begin imminently, if it has not already. The disclosure has attracted attention from international bodies like Belgium's Centre for Cybersecurity and China's MIIT, indicating a high level of concern.
This vulnerability follows the discovery by Koi Security of 341 malicious "skills" on OpenClaw's ClawHub marketplace, one of which was found by Cisco to silently exfiltrate data. This demonstrates that the OpenClaw ecosystem is an active target for malicious actors.
The impact of this vulnerability is critical. A successful exploit grants an attacker full control over the compromised machine. For a developer, this is catastrophic:
Security teams should hunt for signs of compromise related to the OpenClaw agent:
| Type | Value | Description |
|---|---|---|
process_name |
openclaw-agent |
Monitor the openclaw-agent process for anomalous behavior, such as spawning shells (sh, bash, powershell.exe). |
network_traffic_pattern |
Outbound connections from openclaw-agent |
Look for outbound network connections from the agent process to unusual IP addresses or domains, especially those not associated with OpenAI or other known AI services. |
file_path |
~/.openclaw/ |
Monitor for unexpected file creation or modification in the OpenClaw configuration and data directories. |
command_line_pattern |
`curl * | shorwget * -O - |
Detection:
openclaw-agent process and its children. Alert on any suspicious child processes, such as shells or scripting engines. This is a form of Process Analysis (D3-PA).Response:
Immediate Actions:
Strategic Improvements:
Widespread supply chain attack on ClawHub with over 1,100 malicious skills, new 'ClawJacked' flaw, and patch details for CVE-2026-25253.
The OpenClaw AI Agent Framework is experiencing an escalated security crisis. A widespread supply chain attack has been confirmed, with over 1,184 malicious 'skills' flooding the ClawHub marketplace, capable of full system compromise. The existing CVE-2026-25253 RCE vulnerability is now detailed to include sandbox escape capabilities. Additionally, a new flaw, 'ClawJacked,' allows covert hijacking of local AI agent instances. Users are urged to update to version 2026.2.26 or later immediately and treat all previously installed skills as untrusted due to the confirmed widespread compromise.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats