SecurityIntermediate

The OpenClaw Security Crisis: Why Sandboxed Hosting Is No Longer Optional

CVE-2026-25253 and CVE-2026-25593 expose tens of thousands of OpenClaw users to remote code execution. Here is what every user needs to know.

AK

Alex Kumar

Security Researcher, Rapid Claw

·March 25, 2026·16 min read

40,000+

Exposed instances found

2

Critical CVEs

3 hrs

Rapid Claw patch time

Already concerned about your local instance?

Migrate to sandboxed hosting

OpenClaw is an open-source AI agent with over 247,000 GitHub stars that can see your screen, control your keyboard, and access every application on your computer. That power is also its greatest security liability. In March 2026, two critical CVEs — a one-click remote code execution vulnerability (CVE-2026-25253) and a command injection flaw (CVE-2026-25593) — exposed over 40,000 self-hosted OpenClaw instances to full system compromise. Researchers from Malwarebytes, SecurityScorecard, and Microsoft Security have all published warnings. This article explains exactly what the vulnerabilities are, who is at risk, and why a sandboxed hosting environment is the only architecture that fully contains the blast radius.

The Vulnerabilities — What Actually Happened

CVE-2026-25253: One-Click Remote Code Execution

CVE-2026-25253

Critical Remote Code Execution

An attacker can achieve RCE through a single malicious link or file processed by OpenClaw. Because the agent has full system access, compromise exposes credentials, files, tokens, and API keys across the entire host machine.

SecurityScorecard's research found over 40,000 exposed OpenClaw instances publicly reachable on the internet, with more than one third of those showing indicators of RCE vulnerability. The vast majority were self-hosted by individuals and small teams who had followed the standard installation process.

CVE-2026-25593: Command Injection via Agent Input

CVE-2026-25593

Command Injection Vulnerability

A crafted payload injected through an email, web page, or document can cause the agent to execute arbitrary shell commands with the permissions of the user running the process — typically an admin account in local setups.

Microsoft's Security Blog published guidance on running OpenClaw safely, noting plainly that with self-hosted runtimes, "you are responsible for the blast radius." Their recommended mitigation — running the agent in an isolated, sandboxed environment with restricted egress — is architecturally impossible on a standard local installation.

What the Security Community Is Saying

The research community's response has been unusually direct.

A cybersecurity researcher at Northeastern University described OpenClaw as carrying serious privacy risks, noting that users are granting the agent visibility into sensitive information — passwords, financial documents, private communications — without adequate understanding of how that data flows through the system or where it might be exposed.

Malwarebytes published a full analysis concluding that treating a locally-installed OpenClaw instance as a hardened productivity tool requires optimistic assumptions about the security of every dependency, every integration, and every input the agent processes.

Bitsight's research found that most users click through OpenClaw's setup sequence without fully auditing what they've configured. In a default installation, that means an agent with admin-level access and no egress restrictions is running continuously on a machine that also holds their business credentials, client data, and personal accounts.

The Architectural Problem with Local Installation

These vulnerabilities share a common root cause: OpenClaw running locally inherits the full privilege context of its host machine, with no isolation layer between the agent's operations and the broader system.

1

No process isolation.

The agent runs as a native process with the same permissions as the logged-in user. A compromised agent is a compromised user account.

2

No egress controls.

By default, OpenClaw can make outbound connections to any internet endpoint. There is no mechanism to restrict where data can be sent.

3

Credential co-location.

The host machine typically stores the credentials the agent has been given access to. Compromising the agent means accessing those credentials directly.

4

No audit trail.

A locally-installed agent leaves no centralised log of its actions. If something goes wrong, reconstruction is often impossible.

5

Manual update dependency.

Applying patches requires the user to manually pull the latest version. The average self-hosted instance was running 47 days behind at the time of migration to Rapid Claw.

Why Sandboxed Hosting Changes the Security Equation

Local Installation

Process Isolation

None

Egress Controls

None

Credential Security

Co-located with agent

Audit Logging

Manual/Missing

Security Patching

Manual update required

Rapid Claw Sandboxed

Process Isolation

Full container isolation

Egress Controls

Restricted by default

Credential Security

AES-256 encrypted, isolated

Audit Logging

Centralised, immutable

Security Patching

Automatic within 4 hrs

Process isolation via dedicated containers

Every Rapid Claw instance runs in its own isolated container. When compromised, the blast radius is contained to the container itself.

Egress restrictions by default

Containers have restricted outbound network rules. Exploits attempting to exfiltrate data will fail at the network layer.

Credential isolation

Credentials are encrypted at rest with AES-256 and stored separately. Even with code execution, extracting credentials requires defeating a separate encryption layer.

Centralised audit logging

Every agent action is logged and stored separately. Full forensic history is available if an incident occurs.

Automatic security patching

Rapid Claw applied patches to all customer instances within 3 hours of CVE release. No user action required.

What You Should Do Right Now

1

Step 1: Update immediately

Pull the latest OpenClaw version. Both CVEs are patched in the current release. Running an unpatched version is not acceptable if your instance has network access.

2

Step 2: Audit what credentials you've given it

Review every integration your local instance has connected to. Revoke and rotate any OAuth tokens or API keys since before the patch date (February 2026).

3

Step 3: Restrict network access

If you must continue running locally, apply strict outbound firewall rules. The process should not be able to make arbitrary internet connections.

4

Step 4: Assess whether local installation is still appropriate

If your instance has access to production credentials, runs on your primary machine, runs continuously unattended, or you cannot apply patches within 48 hours — sandboxed hosting is the more responsible choice.

A Note on the Open Source Foundation Transition

Following Peter Steinberger's departure to OpenAI in February 2026, OpenClaw's governance has transitioned to an open-source foundation model. This is net positive for long-term security. However, the transition period carries risk — patch response times are less predictable. Rapid Claw maintains a committed SLA to apply critical patches to all customer instances within 4 hours of release, regardless of upstream governance changes.

Conclusion

OpenClaw is exceptional software. The 247,000 GitHub stars reflect genuine quality and a community that has built something remarkable. The security vulnerabilities disclosed in 2026 are not a reason to stop using OpenClaw — they are a reason to use it in an architecture that contains the risk.

The Malwarebytes, SecurityScorecard, and Microsoft Security findings all converge on the same recommendation: OpenClaw running with production credentials should operate in an isolated, sandboxed environment with egress controls, automated patching, and centralised audit logging. That is exactly what Rapid Claw provides.

Frequently Asked Questions

Related Articles

Security by default

Sandboxed. Patched automatically. Isolated by default.

Get your OpenClaw instance running in under 3 minutes. Container isolation, restricted egress, AES-256 encryption. No DevOps required.

99.9% uptime SLA · AES-256 encryption · Automatic CVE patching · No standing staff access