CVE-2026-27646
Sandbox Escape in OpenClaw /acp Spawn Command Enables Host Access
Publication date: 2026-03-23
Last updated on: 2026-03-25
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | to 2026.3.7 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-863 | The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in OpenClaw versions prior to 2026.3.7 and involves a sandbox escape through the /acp spawn command.
Authorized sandboxed sessions can exploit this flaw to initialize a host-side ACP runtime, effectively bypassing sandbox restrictions.
By invoking the /acp spawn slash-command, attackers can cross from a restricted sandboxed chat context into a more privileged host-side ACP session when ACP is enabled.
How can this vulnerability impact me? :
This vulnerability allows attackers with limited sandboxed privileges to escalate their access to the host system by escaping the sandbox.
Such an escalation can lead to unauthorized actions within the host-side ACP runtime, potentially compromising system integrity and confidentiality.
The CVSS v3.1 score of 5.3 indicates a moderate severity with impacts on integrity and limited confidentiality, but no impact on availability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know