Home

Description

OpenClaw before 2026.3.11 contains a session sandbox escape vulnerability in the session_status tool that allows sandboxed subagents to access parent or sibling session state. Attackers can supply arbitrary sessionKey values to read or modify session data outside their sandbox scope, including persisted model overrides.

PUBLISHED Reserved 2026-03-16 | Published 2026-03-29 | Updated 2026-03-30 | Assigner VulnCheck




CRITICAL: 9.2CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
HIGH: 8.4CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N

Problem types

Incorrect Authorization

Product status

Default status
unaffected

Any version before 2026.3.11
affected

2026.3.11 (semver)
unaffected

Credits

tdjackey reporter

References

github.com/...enclaw/security/advisories/GHSA-wcxr-59v9-rxr8 (GitHub Security Advisory (GHSA-wcxr-59v9-rxr8)) third-party-advisory

www.vulncheck.com/...-sandbox-escape-via-session-status-tool (VulnCheck Advisory: OpenClaw < 2026.3.11 - Session Sandbox Escape via session_status Tool) third-party-advisory

cve.org (CVE-2026-32918)

nvd.nist.gov (CVE-2026-32918)

Download JSON