Untriaged
Permalink
CVE-2026-32918
8.4 HIGH
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): NONE
OpenClaw < 2026.3.11 - Session Sandbox Escape via session_status Tool
OpenClaw before 2026.3.11 contains a session sandbox escape vulnerability in the session_status tool that allows sandboxed subagents to access parent or sibling session state. Attackers can supply arbitrary sessionKey values to read or modify session data outside their sandbox scope, including persisted model overrides.
References
-
GitHub Security Advisory (GHSA-wcxr-59v9-rxr8) third-party-advisory
Affected products
OpenClaw
- ==2026.3.11
- <2026.3.11
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>