← Back to stories A team engaged in a collaborative meeting around a table in a modern office setting.
Photo by Mikhail Nilov on Pexels
凤凰科技 2026-04-08

Qihoo 360 (奇虎360) flags three OpenClaw flaws — one high‑risk, two medium‑risk

Summary and immediate impact

Qihoo 360 (奇虎360), one of China’s largest cybersecurity firms, has reportedly discovered three vulnerabilities in OpenClaw, identifying one as high‑risk and two as medium‑risk. It has been reported that the company published an advisory detailing the findings and urged users to apply mitigations or patches promptly. Exact technical details and CVE identifiers were not disclosed in the initial reports available to international media.

What the flaws mean in practice

Public reporting so far is cautious: the high‑risk issue could, if weaponized, allow attackers to compromise affected deployments more severely than the medium‑risk issues, which are likelier to enable partial data disclosure or limited privilege escalation. It has been reported that Qihoo 360 recommended immediate remediation for exposed systems. Organizations using OpenClaw should treat the disclosure as urgent and verify whether they are running vulnerable versions.

Context for Western readers

Qihoo 360 is best known in China for antivirus software, a browser, and a broad portfolio of security services; its findings often feed into both domestic cyber‑defense and commercial products. Why should overseas readers care? Tools and libraries originating in one market can quickly propagate worldwide through supply chains. In the current geopolitical climate — with tightened export controls, sanctions and heightened scrutiny of software provenance — vulnerabilities discovered in Chinese security tooling attract extra attention from enterprises and regulators outside China.

What to watch next

Expect further technical detail and vendor patches to follow. It has been reported that Qihoo 360 is coordinating disclosure, but independent verification by third‑party researchers and upstream maintainers remains important. Administrators should monitor official advisories, inventory any OpenClaw deployments, and apply recommended mitigations without delay.

Space
View original source →