OpenClaw versions prior to 2026.2.19 contain a race condition vulnerability in concurrent updateRegistry and removeRegistryEntry operations for sandbox containers and browsers. Attackers can exploit unsynchronized read-modify-write operations without locking to cause registry updates to lose data, resurrect removed entries, or corrupt sandbox state affecting list, prune, and recreate operations.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gq83-8q7q-9hfx | OpenClaw's serialize sandbox registry writes to prevent races and delete-rollback corruption |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 19 Mar 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.2.19 contain a race condition vulnerability in concurrent updateRegistry and removeRegistryEntry operations for sandbox containers and browsers. Attackers can exploit unsynchronized read-modify-write operations without locking to cause registry updates to lose data, resurrect removed entries, or corrupt sandbox state affecting list, prune, and recreate operations. | |
| Title | OpenClaw < 2026.2.19 - Race Condition in Sandbox Registry Write Operations | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-362 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-19T22:06:55.668Z
Reserved: 2026-03-10T19:48:40.708Z
Link: CVE-2026-32018
No data.
Status : Received
Published: 2026-03-19T22:16:35.463
Modified: 2026-03-19T22:16:35.463
Link: CVE-2026-32018
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA