2026 Q1 Report: AI-based Attacks are Rising and Putting Enterprises at Risk

CVE-2026-25593

OpenClaw Local RCE via WebSocket config.apply: CVE-2026-25593 Overview

CVSS Gauge
CVSS Needle

Summary

CVE-2026-25593 is a high-severity vulnerability in OpenClaw that allows unauthenticated local attackers to execute code through the Gateway WebSocket API. Before version 2026.1.20, the config.apply endpoint accepted unsafe cliPath values, enabling attackers to run arbitrary commands with gateway user privileges.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2026-25593?

Technical Overview

How Does the CVE-2026-25593 Exploit Work?

The attack typically follows these steps:

CVE-2026-25593

What Causes CVE-2026-25593?

Vulnerability Root Cause:

CVE-2026-25593 is caused by OpenClaw’s config.apply WebSocket API accepting configuration input without authentication and insufficiently validating cliPath values. This allows a local client to inject commands that are executed by the gateway process, leading to unauthenticated local remote code execution.

How Can You Mitigate CVE-2026-25593?

If immediate patching is delayed or not possible:

  • Restrict access to the OpenClaw WebSocket API from untrusted local users or processes.
  • Run OpenClaw in a containerized or isolated environment with minimal privileges.
  • Disable the config.apply functionality if it is not essential to operations.
  • Validate configuration inputs to ensure cliPath values do not reference unsafe executables.

Which Assets and Systems Are at Risk?

Will Patching CVE-2026-25593 Cause Downtime?

Patch application impact: Low. Update OpenClaw to 2026.1.20 or later; minimal downtime expected.

Mitigation (if immediate patching is not possible): Restrict WebSocket access to trusted users and disable config.apply if not needed. Full protection requires applying the patch.

How Can You Detect CVE-2026-25593 Exploitation?

Exploitation Signatures:

Look for attempts to use the OpenClaw Gateway WebSocket API to invoke config.apply with unusual or unsafe cliPath values. Repeated or unexpected config writes may indicate an active exploitation attempt.

Indicators of Compromise (IOCs/IOAs):

Behavioral Indicators:

Alerting Strategy:

Remediation & Response

CVSS Breakdown Table

MetricValue Description
Base Score8.4High-severity vulnerability that can allow command execution through the OpenClaw gateway
Attack Vector LocalThe attack requires access from a local client interacting with the gateway’s WebSocket API
Attack ComplexityLowExploitation does not require complex conditions once local access is available
Privileges RequiredNoneThe vulnerability can be triggered without authentication
User InteractionNoneNo user action is needed for the attack to succeed
ScopeUnChangedThe impact remains within the vulnerable OpenClaw component
Confidentiality Impact HighSuccessful exploitation may expose configuration data or system information
Integrity ImpactHighAttackers can modify the configuration and execute commands as the gateway user
Availability ImpactHighCommand execution could disrupt or affect the operation of the gateway

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.