OpenClaw before 2026.3.11 contains a session sandbox escape vulnerability in the session_status tool that allows sandboxed subagents to access parent or sibling session state. Attackers can supply arbitrary sessionKey values to read or modify session data outside their sandbox scope, including persisted model overrides.
https://www.vulncheck.com/advisories/openclaw-session-sandbox-escape-via-session-status-tool
https://github.com/openclaw/openclaw/security/advisories/GHSA-wcxr-59v9-rxr8
Published: 2026-03-29
Updated: 2026-03-29
Base Score: 6.2
Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:N
Severity: Medium
Base Score: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Severity: High
Base Score: 9.2
Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
Severity: Critical