Description
OpenClaw before 2026.2.24 contains a sandbox network isolation bypass vulnerability that allows trusted operators to join another container's network namespace. Attackers can configure the docker.network parameter with container:<id> values to reach services in target container namespaces and bypass network hardening controls.
Published: 2026-03-19
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Network Isolation Bypass
Action: Patch Now
AI Analysis

Impact

The OpenClaw sandbox network isolation bypass allows a trusted operator to join a different container’s network namespace using the docker.network parameter with a container:<id> value. Key detail from CVE description: this technique provides unauthorized access to services within the target container, effectively circumventing network hardening controls. The weakness results in an Access Control Failure, identified as CWE‑284. According to the scoring metadata, the vulnerability carries a CVSS score of 9.3, indicating a high severity that could compromise confidentiality of inter‑container communications and disrupt the isolation guarantees of the platform.

Affected Systems

The affected product is OpenClaw, as listed in the CNA vendor record (OpenClaw:OpenClaw). All releases prior to version 2026.2.24 are vulnerable, because the advisory explicitly states “before 2026.2.24”. No sub‑version or patch level is specified, so the entire range of pre‑2026.2.24 builds should be considered at risk. The CPE entry confirms the vulnerability applies to the Node.js implementation of OpenClaw.

Risk and Exploitability

Key detail from scores: the CVSS score of 9.3 confirms severe impact, while the EPSS value is marked “not available”, making it difficult to quantify current exploitation prevalence. The KEV catalogue lists this issue as “not listed”, indicating it has not yet been recorded as a known exploited vulnerability by CISA. Based on the description, it is inferred that the attacker must have trusted operator or privileged access to supply the docker.network option; the attack vector is therefore likely local or requires elevated container configuration rights. Once the parameter is set, the attacker can reach services in the target container’s network namespace, potentially facilitating lateral movement or exploitation of services running inside the container.

Generated by OpenCVE AI on March 19, 2026 at 23:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.2.24 or newer. Key detail from advisory: upgrade recommended to 2026.2.24.
  • If an upgrade is not immediately possible, remove or disable any docker.network configuration that uses the container:<id> syntax to prevent the bypass. Key detail from security advisory: disabling this option blocks the exploit path.
  • Restrict or audit privileged operator access to container configuration and runtime options to limit the ability to modify docker.network settings.
  • Monitor container network activity for unexpected cross‑container connections to detect potential lateral movement or breaches.

Generated by OpenCVE AI on March 19, 2026 at 23:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-ww6v-v748-x7g9 OpenClaw has a sandbox network isolation bypass via docker.network=container:<id>
History

Fri, 20 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.2.24 contains a sandbox network isolation bypass vulnerability that allows trusted operators to join another container's network namespace. Attackers can configure the docker.network parameter with container:<id> values to reach services in target container namespaces and bypass network hardening controls.
Title OpenClaw - Sandbox Network Isolation Bypass via docker.network=container Parameter
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-284
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-20T20:09:09.689Z

Reserved: 2026-03-10T19:48:44.964Z

Link: CVE-2026-32038

cve-icon Vulnrichment

Updated: 2026-03-20T20:09:05.585Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T22:16:39.997

Modified: 2026-03-23T17:18:25.310

Link: CVE-2026-32038

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T10:44:15Z

Weaknesses