DNA View

High Severity Vulnerability

This vulnerability has been rated as High severity. Immediate action is recommended.

CVE-2026-32048

High
Low Medium High Critical
7.5
CVSS Score
Published: Mar 21, 2026
Last Modified: Mar 24, 2026

Vulnerability Description

OpenClaw versions prior to 2026.3.1 fail to enforce sandbox inheritance during cross-agent sessions_spawn operations, allowing sandboxed sessions to create child processes under unsandboxed agents. An attacker with a sandboxed session can exploit this to spawn child runtimes with sandbox.mode set to off, bypassing runtime confinement restrictions.

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
N
Attack Complexity
H
Privileges Required
L
User Interaction
N
Scope
U
Confidentiality
H
Integrity
H
Availability
H

Known Affected Software

2 configuration(s) from 1 vendor(s)

openclaw
Version:
2026.1.16-2
CPE:
cpe:2.3:a:openclaw:openclaw:2026.1.16-2:*:*:*:*:node.js:*:*
openclaw
Version:
2.0.0
CPE:
cpe:2.3:a:openclaw:openclaw:2.0.0:beta3:*:*:*:node.js:*:*
This vulnerability affects 2 software configuration(s). Ensure you patch all affected systems.

Severity Details

7.5
out of 10.0
High

Weakness Type (CWE)

CWE-732

Incorrect Permission Assignment for Critical Resource

Description
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Exploit Likelihood
High
Typical Severity
High
Abstraction Level
Class

Key Information

Published Date
March 21, 2026