Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-p7gr-f84w-hqg5 | OpenClaw's sandboxed sessions_spawn now enforces sandbox inheritance for cross-agent spawns |
Tue, 24 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 21 Mar 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.3.1 fail to enforce sandbox inheritance during cross-agent sessions_spawn operations, allowing sandboxed sessions to create child processes under unsandboxed agents. An attacker with a sandboxed session can exploit this to spawn child runtimes with sandbox.mode set to off, bypassing runtime confinement restrictions. | |
| Title | OpenClaw < 2026.3.1 - Sandbox Escape via Cross-Agent sessions_spawn | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-732 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-24T13:43:24.405Z
Reserved: 2026-03-10T19:48:47.514Z
Link: CVE-2026-32048
Updated: 2026-03-24T13:43:05.377Z
Status : Analyzed
Published: 2026-03-21T01:17:07.510
Modified: 2026-03-24T19:13:59.783
Link: CVE-2026-32048
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:33:26Z
Github GHSA