Impact
OpenClaw versions older than 2026.3.1 permit sandboxed sessions to invoke the cross‑agent sessions_spawn operation without enforcing sandbox inheritance. The vulnerability is coded as a logic issue (CWE‑732) that enables the creation of child processes whose sandbox mode is explicitly set to off, thereby bypassing runtime confinement restrictions and exposing the host to code execution beyond the intended sandbox limits.
Affected Systems
All OpenClaw deployments running any version earlier than 2026.3.1 are affected; the concerned product is OpenClaw by the OpenClaw vendor.
Risk and Exploitability
The vulnerability carries a CVSS score of 7.7, indicating high severity. No EPSS score is reported and it is not listed in the CISA KEV catalog, but it could still be exploited where a sandboxed session can reach a cross‑agent sessions_spawn endpoint, as inferred from the description. An attacker possessing a sandboxed session can potentially cause the host to launch runtime processes with unrestricted privileges, leading to significant confidentiality and integrity risks.
OpenCVE Enrichment
Github GHSA