CVE-2026-32918

OpenClaw before 2026.3.11 contains a session sandbox escape vulnerability in the session_status tool that allows sandboxed subagents to access parent or sibling session state. Attackers can supply arbitrary sessionKey values to read or modify session data outside their sandbox scope, including persisted model overrides.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

History

31 Mar 2026, 18:09

Type Values Removed Values Added
First Time Openclaw openclaw
Openclaw
References () https://github.com/openclaw/openclaw/security/advisories/GHSA-wcxr-59v9-rxr8 - () https://github.com/openclaw/openclaw/security/advisories/GHSA-wcxr-59v9-rxr8 - Vendor Advisory
References () https://www.vulncheck.com/advisories/openclaw-session-sandbox-escape-via-session-status-tool - () https://www.vulncheck.com/advisories/openclaw-session-sandbox-escape-via-session-status-tool - Third Party Advisory
CPE cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*

29 Mar 2026, 13:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-29 13:17

Updated : 2026-03-31 18:09


NVD link : CVE-2026-32918

Mitre link : CVE-2026-32918

CVE.ORG link : CVE-2026-32918


JSON object : View

Products Affected

openclaw

  • openclaw
CWE
CWE-863

Incorrect Authorization