BACK TO ARCHIVE
2026-03-04P0 CATASTROPHIC
CASE #0047

ClawJacked: 40,000 Systems Compromised in One Exploit Chain

A vulnerability chain dubbed 'ClawJacked' let any website silently take full control of running OpenClaw agents.

CONFIRMED
🔓 SECURITY LEAK💾 DATA LOSS
Incident Brief

Security researchers disclosed a vulnerability chain they named 'ClawJacked' that allowed any website to silently take full control of a running OpenClaw agent. The exploit required no plugins, no special permissions, and no user interaction beyond visiting a webpage. By chaining a cross-origin authentication bypass with a command injection flaw, an attacker could execute arbitrary commands on the victim's machine through their trusted OpenClaw agent. Over 40,000 systems were confirmed compromised before patches were deployed.

AFFECTED USERS: ~40,000

ESTIMATED COST: $10,000,000

Root Cause

The Actual Culprit

The OpenClaw gateway trusted cross-origin requests without proper validation, and the agent execution environment had no sandboxing. A visited webpage could issue commands as if it were the local user.

What Was Done
[OK]Emergency patch released within 24 hours
[--]Users told to update immediately
[OK]PKCE authentication added to gateway
[OK]Agent sandboxing introduced in subsequent release
Lessons Learned
🌐

Browser security boundaries exist for a reason

If your local service accepts cross-origin requests, every website becomes an attack vector.

📦

Sandbox by default

An agent with full system access means any exploit gives the attacker full system access too.

🔄

Patch adoption is the real vulnerability

Releasing a fix means nothing if half your users never update.

Comments (0)

Loading comments...

0/1000
Case Info
Case Number
#0047
Severity
💀P0 CATASTROPHIC
Severity Level
Date
2026-03-04
Affected Systems
OpenClaw Gateway
Host Operating System
Connected Services