OpenClaw patches severe vulnerability granting admin access

Developers of the popular AI tool OpenClaw released patches for three high-severity vulnerabilities, including one that allowed attackers with basic pairing privileges to silently gain full administrative control. The flaw, tracked as CVE-2026-33579 and rated up to 9.8 out of 10 in severity, has raised alarms among security experts. Thousands of exposed instances may have been compromised unknowingly.

OpenClaw, an AI agentic tool launched in November that has amassed 347,000 stars on GitHub, enables users to automate tasks like file organization, research, and online shopping by granting it broad access to computers, apps such as Telegram, Discord, and Slack, network files, and user accounts. Earlier this week, its developers issued security patches addressing three critical issues amid ongoing warnings from security practitioners about the risks of such autonomous AI systems controlling sensitive resources. A Meta executive earlier this year banned the tool from work laptops, citing its unpredictability as a breach risk, with other managers issuing similar directives. > “The practical impact is severe,” researchers from AI app-builder Blink wrote. “An attacker who already holds operator.pairing scope—the lowest meaningful permission in an OpenClaw deployment—can silently approve device pairing requests that ask for operator.admin scope. Once that approval goes through, the attacking device holds full administrative access to the OpenClaw instance. No secondary exploit is needed. No user interaction is required beyond the initial pairing step.” CVE-2026-33579 stemmed from a flaw in the device's pairing function, which failed to verify the approving party's permissions, allowing well-formed requests to escalate privileges unchecked. Blink noted that 63 percent of 135,000 internet-exposed OpenClaw instances scanned earlier this year ran without authentication, enabling any network visitor to gain initial pairing access freely. Patches arrived Sunday, but the formal CVE listing came Tuesday, potentially giving attackers a two-day exploitation window. For organizations using OpenClaw company-wide, a compromised admin device could access all connected data, steal credentials, run arbitrary commands, and pivot to other services, amounting to full instance takeover. Experts urge users to review recent pairing logs and reassess the tool's risks versus benefits.

관련 기사

Dramatic illustration of a computer screen showing OpenClaw AI security warning from Chinese cybersecurity agency, with hacker threats and vulnerability symbols.
AI에 의해 생성된 이미지

중국 사이버보안 기관, OpenClaw AI 위험 경고

AI에 의해 보고됨 AI에 의해 생성된 이미지

중국의 국가 사이버보안 당국은 OpenClaw AI 에이전트 소프트웨어의 보안 위험을 경고했다. 이 소프트웨어는 공격자들이 사용자 컴퓨터 시스템의 완전한 제어를 얻을 수 있게 할 수 있으며, 다운로드와 사용량이 급증하고 주요 국내 클라우드 플랫폼에서 원클릭 배포 서비스를 제공하고 있지만 기본 보안 설정이 취약하다.

OpenClaw, an open-source AI project formerly known as Moltbot and Clawdbot, has surged to over 100,000 GitHub stars in less than a week. This execution engine enables AI agents to perform actions like sending emails and managing calendars on users' behalf within chat interfaces. Its rise highlights potential to simplify crypto usability while raising security concerns.

AI에 의해 보고됨

Following initial alerts from cybersecurity agencies, the Chinese government has warned offices of ongoing security risks from OpenClaw AI, as its use proliferates in government agencies and workplaces despite crackdowns.

Security researchers, first reporting via TechRadar in December 2025, warn WhatsApp's 3 billion users of GhostPairing—a technique tricking victims into linking attackers' browsers to their accounts, enabling full access without breaching passwords or end-to-end encryption.

AI에 의해 보고됨

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

AI에 의해 보고됨

Anthropic's official Git MCP server contained worrying security vulnerabilities that could be chained together for severe impacts. The issues were highlighted in a recent TechRadar report. Details emerged on potential risks to the AI company's infrastructure.

 

 

 

이 웹사이트는 쿠키를 사용합니다

사이트를 개선하기 위해 분석을 위한 쿠키를 사용합니다. 자세한 내용은 개인정보 보호 정책을 읽으세요.
거부