CVE-2026-27646
Received Received - Intake
Sandbox Escape in OpenClaw /acp Spawn Command Enables Host Access

Publication date: 2026-03-23

Last updated on: 2026-03-25

Assigner: VulnCheck

Description
OpenClaw versions prior to 2026.3.7 contain a sandbox escape vulnerability in the /acp spawn command that allows authorized sandboxed sessions to initialize host-side ACP runtime. Attackers can bypass sandbox restrictions by invoking the /acp spawn slash-command to cross from sandboxed chat context into host-side ACP session initialization when ACP is enabled.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-23
Last Modified
2026-03-25
Generated
2026-05-07
AI Q&A
2026-03-24
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.3.7 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in OpenClaw versions prior to 2026.3.7 and involves a sandbox escape through the /acp spawn command.

Authorized sandboxed sessions can exploit this flaw to initialize a host-side ACP runtime, effectively bypassing sandbox restrictions.

By invoking the /acp spawn slash-command, attackers can cross from a restricted sandboxed chat context into a more privileged host-side ACP session when ACP is enabled.


How can this vulnerability impact me? :

This vulnerability allows attackers with limited sandboxed privileges to escalate their access to the host system by escaping the sandbox.

Such an escalation can lead to unauthorized actions within the host-side ACP runtime, potentially compromising system integrity and confidentiality.

The CVSS v3.1 score of 5.3 indicates a moderate severity with impacts on integrity and limited confidentiality, but no impact on availability.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart