Description
OpenClaw before 2026.3.31 contains a sandbox bypass vulnerability allowing attackers to escalate privileges via heartbeat context inheritance and senderIsOwner parameter manipulation. Attackers can exploit improper context validation to bypass sandbox restrictions and achieve unauthorized privilege escalation.
Published: 2026-04-20
Score: 9 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

OpenClaw versions prior to 2026.3.31 are vulnerable to a sandbox bypass that enables attackers to elevate privileges by manipulating heartbeat context inheritance and the senderIsOwner flag. The flaw arises from improper validation of the heartbeat context, allowing a malicious actor to bypass sandbox restrictions and execute code or actions with elevated rights.

Affected Systems

All releases of OpenClaw before 2026.3.31, as indicated by the CNA product entry and the version locator "< 2026.3.31". The vulnerability applies to the node.js implementation of the product, as reflected in the CPE data.

Risk and Exploitability

The CVSS score of 9 underscores a critical severity; the EPSS score of 0.00037 indicates a very low exploitation probability, and the lack of a KEV listing suggests no current widespread exploitation, but the potential impact remains high. Attackers must be able to influence heartbeat context or the senderIsOwner parameter, which is likely achievable through unauthorized API calls or client-side manipulation. Given the high CVSS rating and the nature of the flaw, the risk to confidentiality, integrity, and availability is significant if a sandbox bypass occurs. Based on the description, the likely attack vector involves manipulating the heartbeat context or the senderIsOwner flag through unauthorized API calls.

Generated by OpenCVE AI on April 22, 2026 at 05:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.3.31 or later, which removes the sandbox bypass flaw.
  • Restrict and harden access to the heartbeat API so that only authenticated, trusted callers can provide context and set senderIsOwner flags.
  • Implement input validation on heartbeat context inheritance and enforce that the senderIsOwner parameter can only be true for legitimate owners, rejecting any anomalous or untrusted input.

Generated by OpenCVE AI on April 22, 2026 at 05:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-g5cg-8x5w-7jpm OpenClaw: Heartbeat context inheritance bypasses sandbox via senderIsOwner escalation
History

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 23:30:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.31 contains a sandbox bypass vulnerability allowing attackers to escalate privileges via heartbeat context inheritance and senderIsOwner parameter manipulation. Attackers can exploit improper context validation to bypass sandbox restrictions and achieve unauthorized privilege escalation.
Title OpenClaw < 2026.3.31 - Sandbox Bypass via Heartbeat Context Inheritance and senderIsOwner Escalation
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-648
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-21T19:38:16.140Z

Reserved: 2026-04-20T14:03:06.199Z

Link: CVE-2026-41329

cve-icon Vulnrichment

Updated: 2026-04-21T19:38:13.549Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-21T00:16:31.390

Modified: 2026-04-27T15:09:01.857

Link: CVE-2026-41329

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T06:00:09Z

Weaknesses