Description
OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability allowing leaf subagents to access the subagents control surface and resolve against parent requester scope instead of their own session tree. A low-privilege sandboxed leaf worker can steer or kill sibling runs and cause execution with broader tool policies by exploiting insufficient authorization checks on subagent control requests.
Published: 2026-03-29
Score: 9.3 Critical
EPSS: n/a
KEV: No
Impact: Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

OpenClaw versions before 2026.3.11 include a sandbox boundary bypass that lets a leaf subagent read the subagents control surface and resolve requests against the parent requester’s scope instead of its own session tree. The flaw allows a low‑privileged sandboxed worker to steer or terminate sibling runs, and to launch executions with broader tool policies because authorization checks on control requests are insufficient. This can lead to arbitrary code execution with higher privileges within the sandbox, potentially exposing sensitive data or compromising the host system workflow.

Affected Systems

The product affected is the OpenClaw npm package (OpenClaw:OpenClaw). All releases less than version 2026.3.11 are vulnerable; the issue appears in any Node.js environment where the package is installed, regardless of Node.js version. No specific sub‑versions are listed, so any installation of an affected release should be treated as compromised.

Risk and Exploitability

The severity is high, with a CVSS score of 9.3, indicating a high degree of risk. EPSS data is not available, so the probability of exploitation cannot be quantified, but the absence of this information does not diminish the critical nature of the vulnerability. The flaw is exploitable by an attacker who can gain even minimal access to a sandboxed worker or subagent, typically via web or API interfaces that expose the subagent control surface. Once leveraged, an attacker can manipulate sibling runs and elevate privileges, leading to a full sandbox escape. Although the vulnerability is not listed in CISA’s KEV catalog, the combination of high severity and the nature of the impact warrants urgent attention.

Generated by OpenCVE AI on March 29, 2026 at 14:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.3.11 or later.
  • Restrict or disable the subagent control surface if upgrade is delayed, ensuring that only authorized control requests are accepted.
  • Enable detailed logging of subagent control requests and monitor for anomalous activity.
  • Apply network segmentation to limit external access to the sandboxed environment.

Generated by OpenCVE AI on March 29, 2026 at 14:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 29 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability allowing leaf subagents to access the subagents control surface and resolve against parent requester scope instead of their own session tree. A low-privilege sandboxed leaf worker can steer or kill sibling runs and cause execution with broader tool policies by exploiting insufficient authorization checks on subagent control requests.
Title OpenClaw < 2026.3.11 - Sandbox Boundary Bypass via Subagent Control Surface
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-863
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-29T12:44:20.732Z

Reserved: 2026-03-16T21:19:31.965Z

Link: CVE-2026-32915

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-29T13:16:59.973

Modified: 2026-03-29T13:16:59.973

Link: CVE-2026-32915

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-29T20:31:36Z

Weaknesses