The vulnerability exists in the Control UI of OpenClaw/Clawdbot, where the gatewayUrl query parameter was trusted without validation. The function applySettingsFromUrl in ui/src/ui/app-settings.ts was responsible for parsing this parameter. Before the patch, it would directly call applySettings, which would trigger an automatic WebSocket reconnection to the provided URL. This behavior could be exploited by an attacker by crafting a malicious link containing a gatewayUrl pointing to their own server. When a user clicks this link, the Control UI would load and immediately attempt to connect to the attacker's server, sending the stored gateway authentication token in the WebSocket payload. The attacker could then capture this token and use it to gain full control over the victim's gateway. The patch mitigates this by introducing a confirmation modal. Instead of directly applying the new URL, the applySettingsFromUrl function now sets a pendingGatewayUrl. The user is then prompted with a security warning and must explicitly confirm the change before the application reconnects to the new gateway URL. This prevents the automatic token exfiltration.