Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gq83-8q7q-9hfx | OpenClaw's serialize sandbox registry writes to prevent races and delete-rollback corruption |
Fri, 20 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Mar 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.2.19 contain a race condition vulnerability in concurrent updateRegistry and removeRegistryEntry operations for sandbox containers and browsers. Attackers can exploit unsynchronized read-modify-write operations without locking to cause registry updates to lose data, resurrect removed entries, or corrupt sandbox state affecting list, prune, and recreate operations. | |
| Title | OpenClaw < 2026.2.19 - Race Condition in Sandbox Registry Write Operations | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-362 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-20T14:59:14.566Z
Reserved: 2026-03-10T19:48:40.708Z
Link: CVE-2026-32018
Updated: 2026-03-20T14:59:04.949Z
Status : Analyzed
Published: 2026-03-19T22:16:35.463
Modified: 2026-04-20T14:03:44.843
Link: CVE-2026-32018
No data.
OpenCVE Enrichment
Updated: 2026-03-20T11:05:26Z
Github GHSA