In early 2026, security researchers disclosed CVE-2026-25253 — a critical remote code execution vulnerability in OpenClaw's gateway. Over 21,000 instances were found exposed on the internet. Here's what you need to know.
What Happened
The vulnerability allows an attacker to execute arbitrary code on an OpenClaw instance through a crafted API request to the gateway endpoint. It's a one-click RCE with a CVSS score of 8.8 (High).
Who's Affected
- Any OpenClaw instance with the gateway port exposed to the internet
- Instances running versions prior to the patched release
- Especially self-hosted instances without reverse proxy protection
Who's NOT Affected
- Instances behind a properly configured reverse proxy (Caddy, Nginx) that restricts gateway access
- Instances with authentication enabled on all endpoints
- Managed hosting that applies patches automatically
How to Check If You're Vulnerable
Check Your Version
openclaw --version
If you're running a version released before the patch, update immediately.
Check If Your Gateway Is Exposed
curl -I https://your-instance.com/gateway
If you get a response from outside your network, your gateway is exposed.
Check for Exploitation Signs
Look for unusual activity in your logs:
openclaw logs --filter gateway | grep -i "unexpected\|error\|unauthorized"
How to Fix It
Step 1: Update OpenClaw
openclaw update
Or if using Docker:
docker pull openclaw/openclaw:latest
docker restart openclaw
Step 2: Verify Reverse Proxy
Ensure your reverse proxy (Caddy, Nginx) only forwards necessary paths:
Caddy example:
your-domain.com {
reverse_proxy localhost:3000
# Block direct gateway access from outside
}
Step 3: Enable Authentication
Ensure all gateway endpoints require authentication. Check your configuration:
openclaw config get gateway.auth
Step 4: Restrict Network Access
If possible, bind the gateway to localhost only and access through your reverse proxy:
openclaw config set gateway.host "127.0.0.1"
Why This Keeps Happening
Self-hosted AI agents face a fundamental challenge: most users aren't security experts. Common mistakes:
- Exposing the gateway port directly to the internet
- Using default credentials
- Not applying security updates promptly
- Running without a reverse proxy
- Not enabling authentication
Each of these is a potential attack vector.
How Managed Hosting Helps
ClawTank protects against these vulnerabilities by design:
- Automatic updates — security patches applied immediately
- Reverse proxy — Caddy with auto-TLS sits in front of every container
- Container isolation — even if one instance is compromised, others are safe
- Network restrictions — gateway ports aren't exposed to the internet
- Authentication enforced — all endpoints require auth by default
You don't need to be a security expert. Managed hosting handles it.
The Broader Lesson
AI agents are powerful but they expand your attack surface. Every running instance is a potential target. The OpenClaw community is actively improving security, but the safest approach for non-security-experts is managed hosting.
Stay Protected
Deploy on ClawTank where security patches are automatic and your instance is protected by container isolation, reverse proxy, and enforced authentication. Focus on using your AI agent, not securing it.
