OpenClaw before 2026.3.11 contains a session sandbox escape vulnerability in the session_status tool that allows sandboxed subagents to access parent or sibling session state. Attackers can supply arbitrary sessionKey values to read or modify session data outside their sandbox scope, including persisted model overrides.
References
| Link | Resource |
|---|---|
| https://github.com/openclaw/openclaw/security/advisories/GHSA-wcxr-59v9-rxr8 | Vendor Advisory |
| https://www.vulncheck.com/advisories/openclaw-session-sandbox-escape-via-session-status-tool | Third Party Advisory |
Configurations
History
31 Mar 2026, 18:09
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Openclaw openclaw
Openclaw |
|
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-wcxr-59v9-rxr8 - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-session-sandbox-escape-via-session-status-tool - Third Party Advisory | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* |
29 Mar 2026, 13:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-29 13:17
Updated : 2026-03-31 18:09
NVD link : CVE-2026-32918
Mitre link : CVE-2026-32918
CVE.ORG link : CVE-2026-32918
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-863
Incorrect Authorization
