OpenClaw and the risk of loopback: a browser tab can take control of an IA self-hosted

Published 4 min de lectura 110 reading

A few days ago, the security community found a serious failure in OpenClaw, one of the platforms of self-hosted IA agents that in recent months has grown rapidly in popularity. Research Oasis Security identified a weakness that allowed a malicious website to communicate with a local OpenClaw instance and try passwords until you guess the right one, all without the user noticing anything in your browser.

The root of the problem was in the OpenClaw gateway service, which exposes a WebSocket interface linked to default localhost. This combination was dangerous because, unlike other web APIs, browsers allow WebSocket to open connections to loopback directions without the source policies (same-origin) preventing the connection. You can see how these connections work in the technical documentation of the browsers on the page of MDN Web Docs on WebSocket.

OpenClaw and the risk of loopback: a browser tab can take control of an IA self-hosted
Image generated with IA.

The most worrying thing was not only the possibility of connecting, but how OpenClaw treated local connections: the rate limitation protections were designed to avoid brute force attacks, but they usually exclude the direction of loopback (127.0.0.1) so as not to block legitimate sessions from the machine itself. This exception opened a window that, according to researchers, allowed hundreds of attempts per second from JavaScript in a browser tab, which was sufficient to exhaust lists of common passwords in second fractions and larger dictionaries within minutes.

In addition, the OpenClaw gateway accepted matching devices from localhost without asking the user for confirmation, so that, once the management password was guessed, an attacker could register as a trust device and obtain administrator permits. With that direct access to the platform, the attacker could list connected nodes, filter and steal credentials, read records and order the agent to search for or exfilter sensitive information, and even run shell commands on matched machines. In a few words: a browser tab could become the vector for a complete take-over of the job.

Oasis Security showed evidence of concept and a practical demonstration of abuse, and reported the problem to OpenLaw developers. The reaction was rapid: in less than 24 hours a correction was published, included in version 2026.2.26 released on 26 February, which tightens the security checks on WebSocket connections and adds protections so that the connections from loopback cannot be used for brute force attacks or session appropriation, even if they are free from design limitations.

This incidence shows a double risk that accompanies the boom of self-hosted platforms of autonomous agents: on the one hand, the large attack surface that involves exposing a local control service with administrative capabilities; on the other, the combination of browser behaviors and server configurations designed for convenience but that can be exploited. Security teams and administrators who deploy this type of software must assume that any local interface can be reached from a browser and design corresponding defenses.

OpenClaw is not the only project to rethink its trust model: research also recalls that public skill repositories and plugins can be used by malicious actors to distribute dangerous instructions. In the specific case, attempts to abuse the "ClawHub" repository have been observed to promote skills that deploy malware information collector or persuade users to run harmful commands on their machines.

OpenClaw and the risk of loopback: a browser tab can take control of an IA self-hosted
Image generated with IA.

If you administer or use an OpenClaw instance, the immediate recommendation is to update to the parcheed version (2026.2.26 or later). Beyond the patch, it is appropriate to review administrative and key passwords, apply strong and unique passwords policies, minimize exposure of administration interfaces to unreliable networks, and monitor abnormal records and behaviors in the agent's integrations. For those who want to deepen the tests and techniques around WebSocket channels, the OWASP Web Security Testing Guide provides useful guidance on vectors and mitigation.

The good news is how quickly this hole was solved after responsible disclosure: an example of how technical exchange between researchers and developers can limit the impact. The lesson, however, must last: with tools that can run actions in real environments and access connected devices, design security and continuous review are essential. It is not enough for a service to work; it has to be armored to assume that the local interface is also a potential entry door for an attacker.

For those who want to read the full technical report and see the demonstration shared by the discoverers, the Oasis entry contains the details of the finding and the evidence: Oasis Security report on vulnerability in OpenClaw. Keeping informed and applying patches quickly remains the best defense against such threats.

Coverage

Related

More news on the same subject.