BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Weekly Vulnerability Roundup: OpenClaw AI Agent Hijacking, Vim Command Injection, and Vitess Path Traversal

Weekly Vulnerability Roundup: OpenClaw AI Agent Hijacking, Vim Command Injection, and Vitess Path Traversal

March 1, 2026Vulnerabilities & Exploits3 min readhigh

Originally reported by The Hacker News, MSRC Security Updates

#vulnerability-disclosure#ai-security#command-injection#buffer-overflow#path-traversal#vim#openclaw#vitess
Share

TL;DR

Security researchers disclosed a high-severity vulnerability in OpenClaw that allows malicious websites to hijack local AI agents via WebSocket connections. Microsoft's security update guide also published three new CVEs affecting Vim and Vitess.

Why high?

The OpenClaw vulnerability allows complete takeover of AI agents through malicious websites, representing a significant threat to users of AI automation tools with potential for widespread exploitation.

Weekly Vulnerability Roundup: OpenClaw AI Agent Hijacking, Vim Command Injection, and Vitess Path Traversal

This week brought disclosure of vulnerabilities spanning AI automation tools, text editors, and database systems. The most significant finding involves a WebSocket-based attack against OpenClaw AI agents that requires no user interaction beyond visiting a malicious website.

OpenClaw AI Agent Hijacking via WebSocket

Security researchers at Oasis disclosed a high-severity vulnerability in OpenClaw that enables malicious websites to connect to and control locally running AI agents. The flaw, dubbed "ClawJacked," affects the core OpenClaw gateway system without requiring any plugins or extensions.

According to the researchers, the vulnerability exists in the base OpenClaw installation running with default configuration. When successfully exploited, an attacker-controlled website can establish a WebSocket connection to the local AI agent and execute arbitrary commands or access sensitive data.

OpenClaw has released a fix for this issue. Organizations using OpenClaw for AI automation should update immediately and review their network security configurations to limit unnecessary exposure of local services.

Vim Command Injection in netrw Plugin

Microsoft published details for CVE-2026-28417, an OS command injection vulnerability in Vim's netrw plugin. The netrw plugin provides file browsing and remote editing capabilities within Vim, making it a commonly used component.

Command injection vulnerabilities in text editors can be particularly dangerous as they may allow attackers to execute arbitrary system commands when users open specially crafted files or navigate to malicious network locations through the editor interface.

Vim users should update to the latest version and exercise caution when opening files from untrusted sources or browsing remote directories.

Vim Stack Buffer Overflow

A second Vim vulnerability, CVE-2026-28422, involves a stack buffer overflow in the build_stl_str_hl() function. Stack buffer overflows can potentially lead to code execution or denial of service conditions depending on exploitation techniques and system protections.

This vulnerability likely affects Vim's status line processing functionality. The combination of two Vim vulnerabilities in the same disclosure cycle suggests organizations should prioritize updating their Vim installations across development and administrative systems.

Vitess Backup Restoration Path Traversal

CVE-2026-27969 affects Vitess, a database clustering system for horizontal scaling of MySQL. The vulnerability allows users with backup storage access to write files to arbitrary paths during database restoration operations.

Path traversal vulnerabilities in backup systems pose significant risks as they can enable attackers to overwrite critical system files or place malicious content in sensitive locations. Organizations using Vitess for database clustering should review backup access controls and update to the patched version.

The vulnerability requires existing backup storage access, limiting the attack surface to users with legitimate backup permissions who may have been compromised or malicious insiders.

Sources

  • ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket - The Hacker News
  • CVE-2026-28417 Vim has OS Command Injection in netrw - MSRC Security Updates
  • CVE-2026-28422 Vim has stack-buffer-overflow in build_stl_str_hl() - MSRC Security Updates
  • CVE-2026-27969 Vitess users with backup storage access can write to arbitrary file paths on restore - MSRC Security Updates

Originally reported by The Hacker News, MSRC Security Updates

Tags

#vulnerability-disclosure#ai-security#command-injection#buffer-overflow#path-traversal#vim#openclaw#vitess

Related Intelligence

  • ClawJacked Vulnerability in OpenClaw Enables Browser-Based AI Agent Hijacking

    highFeb 28, 2026
  • Active Android Exploit, Government-Targeted Campaigns, and OAuth Abuse Highlight March Threat Landscape

    highMar 3, 2026
  • Critical AI Tool Flaws and Supply Chain Exposure Highlight Security Challenges

    highMar 3, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Chrome Announces Quantum-Safe Certificate Program Using Merkle Tree Certificates

Next Article

UAE's Real-Time Missile Defense System Intercepts Iranian Strike Package →