OpenClaw versions prior to 2026.2.19 contain a race condition vulnerability in concurrent updateRegistry and removeRegistryEntry operations for sandbox containers and browsers. Attackers can exploit unsynchronized read-modify-write operations without locking to cause registry updates to lose data, resurrect removed entries, or corrupt sandbox state affecting list, prune, and recreate operations.
https://www.vulncheck.com/advisories/openclaw-race-condition-in-sandbox-registry-write-operations
https://github.com/openclaw/openclaw/security/advisories/GHSA-gq83-8q7q-9hfx
https://github.com/openclaw/openclaw/commit/cc29be8c9bcdfaecb90f0ab13124c8f5362a6741
Published: 2026-03-19
Updated: 2026-03-20
Base Score: 2.4
Vector: CVSS2#AV:L/AC:H/Au:S/C:N/I:P/A:P
Severity: Low
Base Score: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
Severity: Low
Base Score: 6.9
Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
Severity: Medium
EPSS: 0.00011