CVSS 9.8CRITICAL
The vulnerability is critical due to the high likelihood of exploitation by multiple APT groups and potential for data leaks. Real-world exploitability is very high as instances are publicly exposed without authentication.

Publicly exposed OpenClaw instances are vulnerable due to lack of authentication, leading to potential unauthorized access and data leaks. This affects organizations using OpenClaw without proper security configurations.

Affected Systems
  • OpenClaw
Affected Versions: all versions before patching
Remediation
  • Enable authentication on all OpenClaw instances immediately using the command: 'openclaw config set auth true'
  • Restrict public exposure by configuring firewall rules to only allow trusted IP addresses access.
  • Apply any available patches and ensure that the system is up-to-date with the latest security updates.
Stack Impact

This affects OpenClaw deployments, which may interact with various services depending on the configuration but does not directly affect nginx, docker, linux kernel, openssh, curl, openssl, python, or homelab components.

Source →