A critical vulnerability in the OpenClaw Gateway WebSocket has been confirmed by its founder, Peter, according to PANews. The 360 Security Cloud team received an official email from Peter, acknowledging the exclusive discovery of the unauthenticated upgrade flaw by the 360 team.
The high-risk vulnerability has been reported to the National Information Security Vulnerability Sharing Platform (CNVD) by 360, aiming to swiftly eliminate the risk across the network. This WebSocket unauthenticated upgrade flaw is classified as a zero-day (0Day) vulnerability, which attackers can exploit to silently bypass permission authentication via WebSocket, potentially gaining control over the intelligent gateway. This could lead to resource exhaustion or a complete system crash.