CVE-2026-32018

medium

Description

OpenClaw versions prior to 2026.2.19 contain a race condition vulnerability in concurrent updateRegistry and removeRegistryEntry operations for sandbox containers and browsers. Attackers can exploit unsynchronized read-modify-write operations without locking to cause registry updates to lose data, resurrect removed entries, or corrupt sandbox state affecting list, prune, and recreate operations.

References

https://www.vulncheck.com/advisories/openclaw-race-condition-in-sandbox-registry-write-operations

https://github.com/openclaw/openclaw/security/advisories/GHSA-gq83-8q7q-9hfx

https://github.com/openclaw/openclaw/commit/cc29be8c9bcdfaecb90f0ab13124c8f5362a6741

Details

Source: Mitre, NVD

Published: 2026-03-19

Updated: 2026-03-20

Risk Information

CVSS v2

Base Score: 2.4

Vector: CVSS2#AV:L/AC:H/Au:S/C:N/I:P/A:P

Severity: Low

CVSS v3

Base Score: 3.6

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L

Severity: Low

CVSS v4

Base Score: 6.9

Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

Severity: Medium

EPSS

EPSS: 0.00011