OpenClaw is a personal AI assistant. Prior to version 2026.2.15, a configuration injection issue in the Docker tool sandbox could allow dangerous Docker options (bind mounts, host networking, unconfined profiles) to be applied, enabling container escape or host data access. OpenClaw 2026.2.15 blocks dangerous sandbox Docker settings and includes runtime enforcement when building `docker create` args; config-schema validation for `network=host`, `seccompProfile=unconfined`, `apparmorProfile=unconfined`; and security audit findings to surface dangerous sandbox docker config. As a workaround, do not configure `agents.*.sandbox.docker.binds` to mount system directories or Docker socket paths, keep `agents.*.sandbox.docker.network` at `none` (default) or `bridge`, and do not use `unconfined` for seccomp/AppArmor profiles.
References
| Link | Resource |
|---|---|
| https://github.com/openclaw/openclaw/commit/887b209db47f1f9322fead241a1c0b043fd38339 | Patch |
| https://github.com/openclaw/openclaw/releases/tag/v2026.2.15 | Product Release Notes |
| https://github.com/openclaw/openclaw/security/advisories/GHSA-w235-x559-36mg | Mitigation Patch Vendor Advisory |
Configurations
History
20 Feb 2026, 18:11
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| First Time |
Openclaw openclaw
Openclaw |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| References | () https://github.com/openclaw/openclaw/commit/887b209db47f1f9322fead241a1c0b043fd38339 - Patch | |
| References | () https://github.com/openclaw/openclaw/releases/tag/v2026.2.15 - Product, Release Notes | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-w235-x559-36mg - Mitigation, Patch, Vendor Advisory |
20 Feb 2026, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-20 00:16
Updated : 2026-02-20 18:11
NVD link : CVE-2026-27002
Mitre link : CVE-2026-27002
CVE.ORG link : CVE-2026-27002
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-250
Execution with Unnecessary Privileges
