CVE-2026-32915
Sandbox Bypass in OpenClaw Subagents Enables Privilege Escalation
Publication date: 2026-03-29
Last updated on: 2026-03-31
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openclaw | openclaw | to 2026.3.11 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-863 | The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
The recommended immediate step to mitigate this vulnerability is to upgrade OpenClaw to version 2026.3.11 or later.
This update removes subagents control access from leaf subagents by default, restricts subagent control to the callerβs own descendant sessions, and rejects any steer or kill requests targeting runs outside that descendant tree, thereby fixing the sandbox boundary bypass issue.
Can you explain this vulnerability to me?
CVE-2026-32915 is a sandbox boundary bypass vulnerability in OpenClaw versions before 2026.3.11. It occurs because leaf subagents, which are supposed to be confined to their own session trees, can improperly access the subagents control surface and resolve control requests against the parent requester scope instead. This means a low-privilege sandboxed leaf worker can manipulate sibling subagent runs by steering or killing them, actions that should be restricted. The root cause is insufficient authorization checks on subagent control requests, allowing unauthorized control beyond intended boundaries.
The vulnerability is classified under CWE-269 (Improper Privilege Management) and CWE-863 (Incorrect Authorization). It allows execution with broader tool policies than intended, effectively bypassing sandbox and session-scope boundaries.
How can this vulnerability impact me? :
This vulnerability can have serious impacts by allowing a low-privilege sandboxed leaf worker to escalate privileges within the OpenClaw environment. Specifically, it can manipulate sibling subagent runs by steering or terminating them, potentially disrupting operations or causing unauthorized execution of actions under broader tool policies.
The impact includes high confidentiality, integrity, and availability risks, as unauthorized control can lead to data exposure, unauthorized modifications, and denial of service within the affected system.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how CVE-2026-32915 affects compliance with common standards and regulations such as GDPR or HIPAA.