OpenClaw before 2026.3.31 contains a sandbox bypass vulnerability allowing attackers to escalate privileges via heartbeat context inheritance and senderIsOwner parameter manipulation. Attackers can exploit improper context validation to bypass sandbox restrictions and achieve unauthorized privilege escalation.
CVSS v3.1 Score
9.9
/ 10.0
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Information
- Published
- 21 avr. 2026
- Updated
- 27 avr. 2026
- Status
- Analyzed
- Source
- disclosure@vulncheck.com
Affected products
openclaw openclaw
Versions : 2026.3.31
Weaknesses (CWE)
CWE-648
References (3)
Similar CVEs
Other vulnerabilities of type CWE-648
Loading…
Monitor your products
Get automatic alerts for every new CVE affecting your equipment.