Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

February 22, 2026

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

February 22, 2026

npm’s Update to Harden Their Supply Chain, and Points to Consider

February 22, 2026
Facebook X (Twitter) Instagram
Sunday, February 22
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Researchers Reveal Six New OpenClaw Vulnerabilities
News

Researchers Reveal Six New OpenClaw Vulnerabilities

Team-CWDBy Team-CWDFebruary 19, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


OpenClaw has patched six new vulnerabilities in its popular agentic AI assistant, covering server-side request forgery (SSRF), missing authentication and path traversal bugs, according to Endor Labs.

The vulnerabilities, some of which do not have CVE IDs, range from moderate to high severity, the security vendor said in a blog post published on February 18.

The flaws it found are as follows:

  • CVE-2026-26322: A Server-Side Request Forgery (SSRF) bug affecting OpenClaw’s Gateway tool, with a CVSS score of 7.6 (high severity)
  • CVE-2026-26319: Missing Telnyx webhook authentication with a CVSS score of 7.5 (high severity)
  • CVE-2026-26329: Path traversal in browser upload, high severity but with no CVSS score assigned
  • A high severity (CVSS 7.6) SSRF vulnerability impacting OpenClaw’s image tool, with the GitHub Security Advisory code of GHSA-56f2-hvwg-5743
  • A moderate severity (CVSS 6.5) SSRF vulnerability in Urbit authentication (GHSA-pg2v-8xwh-qhcc)
  • A moderate severity (CVSS 6.5) Twilio webhook authentication bypass vulnerability (GHSA-c37p-4qqg-3p76)

Read more on OpenClaw: Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw

Endor Labs argued that its research reveals important lessons for developers of AI agent infrastructure.

“Data flow analysis is essential for modern applications,” it said. “The multi-layer architecture of AI agent frameworks means vulnerabilities often span multiple files and components. Understanding the complete source-to-sink path is critical.”

The security vendor also pointed to the following:

  • Trust boundaries extend beyond traditional user input. Configuration values, LLM outputs, and tool parameters are potential attack surfaces that require validation
  • Validation must occur at every layer for defense in depth. Several vulnerabilities Endor Labs found existed because validation was missing at all stages
  • AI-specific patterns require specialized analysis. Traditional static application security testing (SAST) tools designed for regular web app aren’t able to identify issues in LLM-to-tool flows, conversation state management, and agent-specific trust boundaries

OpenClaw Remains an Open Book

Endor Labs revealed last week that it had discovered seven vulnerabilities in total. It’s unclear whether OpenClaw’s development team is still working on a fix for the final one.

In the meantime, major security concerns persist over its undocumented use in the enterprise.

A week ago, a SecurityScorecard report warned of tens of thousands of misconfigured instances that have been exposed to the public internet. This could enable threat actors to gain full access to potentially sensitive corporate systems the OpenClaw instance is able to interact with.

The security vendor also revealed three high-severity CVEs in OpenClaw with public exploit code available for each.

The risk of indirect prompt injection and the presence of malicious “skills” (plugins) on ClawHub are particularly troubling.

Threat actors are already targeting agents with infostealers, it was revealed this week.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits
Next Article Why Your Organization Should Start Quantum Preparedness Today
Team-CWD
  • Website

Related Posts

News

UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

February 22, 2026
News

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

February 22, 2026
News

npm’s Update to Harden Their Supply Chain, and Points to Consider

February 22, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How the always-on generation can level up their cybersecurity game

September 11, 2025

Watch out for SVG files booby-trapped with malware

September 22, 2025

Find your weak spots before attackers do

November 21, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.