SecurityScorecard just published findings that should make every self-hosted OpenClaw user stop and check their setup. Their team found 40,214 exposed OpenClaw instances across 28,663 unique IP addresses. 63% of those deployments are running vulnerable versions. And 12,812 are exploitable via remote code execution.
The numbers are spread across 82 countries. 37% sit in China, followed by the US and Singapore. According to Infosecurity Magazine, 45% of all exposed instances run on Alibaba Cloud.
Why This Keeps Getting Worse
Here's the part that caught my attention. Jeremy Turner, VP of Threat Intelligence at SecurityScorecard, told The Register: "Usually when we do scans for a vulnerability, what we start with in the first scan is the most of the exposure and then over time it decreases. In this case, because it's a new technology and more users are adopting it, we see that trend actually doing the opposite."
So the exposure is growing, not shrinking. That's unusual and concerning.
The Root Cause Is Simple
OpenClaw's Docker deployment binds to 0.0.0.0:18789 by default. That means all network interfaces, including the public internet. The desktop CLI version correctly binds to 127.0.0.1 (localhost only). But most VPS and cloud users go the Docker route, and if you don't change that default, your instance is wide open.
SecurityScorecard also flagged three CVEs worth knowing about:
CVE-2026-25253 (CVSS 8.8): One-click RCE through auth token theft
CVE-2026-25157 (CVSS 7.8): SSH command injection
CVE-2026-24763 (CVSS 8.8): Docker sandbox escape
Turner added: "It's only a matter of time before we see threat actors actively exploiting these exposures."
What You Should Do
If you're running OpenClaw on a VPS, check your Docker Compose config right now. Make sure port 18789 is bound to 127.0.0.1, not 0.0.0.0. Update to the latest version. And read our security hardening guide for the full checklist.
Or skip all of that. ClawHosters runs every instance in an isolated container with authentication enforced, restricted network access, and the built-in safety scanner running automatically. No exposed ports, no misconfiguration risk.