OpenClaw versions prior to 2026.3.1 fail to enforce sandbox inheritance during cross-agent sessions_spawn operations, allowing sandboxed sessions to create child processes under unsandboxed agents. An attacker with a sandboxed session can exploit this to spawn child runtimes with sandbox.mode set to off, bypassing runtime confinement restrictions.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 21 Mar 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.3.1 fail to enforce sandbox inheritance during cross-agent sessions_spawn operations, allowing sandboxed sessions to create child processes under unsandboxed agents. An attacker with a sandboxed session can exploit this to spawn child runtimes with sandbox.mode set to off, bypassing runtime confinement restrictions. | |
| Title | OpenClaw < 2026.3.1 - Sandbox Escape via Cross-Agent sessions_spawn | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-732 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-21T00:42:21.169Z
Reserved: 2026-03-10T19:48:47.514Z
Link: CVE-2026-32048
No data.
Status : Received
Published: 2026-03-21T01:17:07.510
Modified: 2026-03-21T01:17:07.510
Link: CVE-2026-32048
No data.
OpenCVE Enrichment
No data.
Weaknesses