OpenClaw versions prior to 2026.2.19 contain a race condition vulnerability in concurrent updateRegistry and removeRegistryEntry operations for sandbox containers and browsers. Attackers can exploit unsynchronized read-modify-write operations without locking to cause registry updates to lose data, resurrect removed entries, or corrupt sandbox state affecting list, prune, and recreate operations.
References
Configurations
History
20 Apr 2026, 14:03
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Openclaw openclaw
Openclaw |
|
| Summary |
|
|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/openclaw/openclaw/commit/cc29be8c9bcdfaecb90f0ab13124c8f5362a6741 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-gq83-8q7q-9hfx - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-race-condition-in-sandbox-registry-write-operations - Third Party Advisory |
19 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-19 22:16
Updated : 2026-04-20 14:03
NVD link : CVE-2026-32018
Mitre link : CVE-2026-32018
CVE.ORG link : CVE-2026-32018
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
