OpenClaw patches severe vulnerability granting admin access

Developers of the popular AI tool OpenClaw released patches for three high-severity vulnerabilities, including one that allowed attackers with basic pairing privileges to silently gain full administrative control. The flaw, tracked as CVE-2026-33579 and rated up to 9.8 out of 10 in severity, has raised alarms among security experts. Thousands of exposed instances may have been compromised unknowingly.

OpenClaw, an AI agentic tool launched in November that has amassed 347,000 stars on GitHub, enables users to automate tasks like file organization, research, and online shopping by granting it broad access to computers, apps such as Telegram, Discord, and Slack, network files, and user accounts. Earlier this week, its developers issued security patches addressing three critical issues amid ongoing warnings from security practitioners about the risks of such autonomous AI systems controlling sensitive resources. A Meta executive earlier this year banned the tool from work laptops, citing its unpredictability as a breach risk, with other managers issuing similar directives. > “The practical impact is severe,” researchers from AI app-builder Blink wrote. “An attacker who already holds operator.pairing scope—the lowest meaningful permission in an OpenClaw deployment—can silently approve device pairing requests that ask for operator.admin scope. Once that approval goes through, the attacking device holds full administrative access to the OpenClaw instance. No secondary exploit is needed. No user interaction is required beyond the initial pairing step.” CVE-2026-33579 stemmed from a flaw in the device's pairing function, which failed to verify the approving party's permissions, allowing well-formed requests to escalate privileges unchecked. Blink noted that 63 percent of 135,000 internet-exposed OpenClaw instances scanned earlier this year ran without authentication, enabling any network visitor to gain initial pairing access freely. Patches arrived Sunday, but the formal CVE listing came Tuesday, potentially giving attackers a two-day exploitation window. For organizations using OpenClaw company-wide, a compromised admin device could access all connected data, steal credentials, run arbitrary commands, and pivot to other services, amounting to full instance takeover. Experts urge users to review recent pairing logs and reassess the tool's risks versus benefits.

相关文章

Dramatic illustration of a computer screen showing OpenClaw AI security warning from Chinese cybersecurity agency, with hacker threats and vulnerability symbols.
AI 生成的图像

中国网络安全机构警告OpenClaw AI代理软件风险

由 AI 报道 AI 生成的图像

中国国家网络安全机构警告OpenClaw AI代理软件存在安全漏洞,可能允许攻击者完全控制用户计算机系统。该软件最近下载量激增,主要云平台提供一键部署服务,但默认安全配置薄弱。

OpenClaw, an open-source AI project formerly known as Moltbot and Clawdbot, has surged to over 100,000 GitHub stars in less than a week. This execution engine enables AI agents to perform actions like sending emails and managing calendars on users' behalf within chat interfaces. Its rise highlights potential to simplify crypto usability while raising security concerns.

由 AI 报道

Following initial alerts from cybersecurity agencies, the Chinese government has warned offices of ongoing security risks from OpenClaw AI, as its use proliferates in government agencies and workplaces despite crackdowns.

Security researchers, first reporting via TechRadar in December 2025, warn WhatsApp's 3 billion users of GhostPairing—a technique tricking victims into linking attackers' browsers to their accounts, enabling full access without breaching passwords or end-to-end encryption.

由 AI 报道

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

由 AI 报道

Anthropic's official Git MCP server contained worrying security vulnerabilities that could be chained together for severe impacts. The issues were highlighted in a recent TechRadar report. Details emerged on potential risks to the AI company's infrastructure.

 

 

 

此网站使用 cookie

我们使用 cookie 进行分析以改进我们的网站。阅读我们的 隐私政策 以获取更多信息。
拒绝