header-langage
简体中文
繁體中文
English
Tiếng Việt
한국어
日本語
ภาษาไทย
Türkçe
Scan to Download the APP

GoPlus: OpenClaw Gateway Vulnerability Disclosure, Users Must Upgrade to version 2026.2.25 or higher

BlockBeats News, March 2nd, according to GoPlus monitoring, OpenClaw Gateway has a high-risk vulnerability, users need to upgrade to version 2026.2.25 or higher. At the same time, audit and revoke unnecessary credentials, API keys, and node permissions granted to proxy instances.


OpenClaw runs through a WebSocket Gateway bound to the localhost, which serves as the core coordination layer for the proxy and is a critical part of OpenClaw. This attack targets vulnerabilities in the Gateway layer to allow users to access malicious websites controlled by hackers through their browsers.

举报 Correction/Report
Correction/Report
Submit
Add Library
Visible to myself only
Public
Save
Choose Library
Add Library
Cancel
Finish