CVE-2026-32915
Received Received - Intake
Sandbox Bypass in OpenClaw Subagents Enables Privilege Escalation

Publication date: 2026-03-29

Last updated on: 2026-03-31

Assigner: VulnCheck

Description
OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability allowing leaf subagents to access the subagents control surface and resolve against parent requester scope instead of their own session tree. A low-privilege sandboxed leaf worker can steer or kill sibling runs and cause execution with broader tool policies by exploiting insufficient authorization checks on subagent control requests.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-29
Last Modified
2026-03-31
Generated
2026-05-07
AI Q&A
2026-03-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.3.11 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

The recommended immediate step to mitigate this vulnerability is to upgrade OpenClaw to version 2026.3.11 or later.

This update removes subagents control access from leaf subagents by default, restricts subagent control to the caller’s own descendant sessions, and rejects any steer or kill requests targeting runs outside that descendant tree, thereby fixing the sandbox boundary bypass issue.


Can you explain this vulnerability to me?

CVE-2026-32915 is a sandbox boundary bypass vulnerability in OpenClaw versions before 2026.3.11. It occurs because leaf subagents, which are supposed to be confined to their own session trees, can improperly access the subagents control surface and resolve control requests against the parent requester scope instead. This means a low-privilege sandboxed leaf worker can manipulate sibling subagent runs by steering or killing them, actions that should be restricted. The root cause is insufficient authorization checks on subagent control requests, allowing unauthorized control beyond intended boundaries.

The vulnerability is classified under CWE-269 (Improper Privilege Management) and CWE-863 (Incorrect Authorization). It allows execution with broader tool policies than intended, effectively bypassing sandbox and session-scope boundaries.


How can this vulnerability impact me? :

This vulnerability can have serious impacts by allowing a low-privilege sandboxed leaf worker to escalate privileges within the OpenClaw environment. Specifically, it can manipulate sibling subagent runs by steering or terminating them, potentially disrupting operations or causing unauthorized execution of actions under broader tool policies.

The impact includes high confidentiality, integrity, and availability risks, as unauthorized control can lead to data exposure, unauthorized modifications, and denial of service within the affected system.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify how CVE-2026-32915 affects compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart