CVE-2026-32918

critical

Description

OpenClaw before 2026.3.11 contains a session sandbox escape vulnerability in the session_status tool that allows sandboxed subagents to access parent or sibling session state. Attackers can supply arbitrary sessionKey values to read or modify session data outside their sandbox scope, including persisted model overrides.

References

https://www.vulncheck.com/advisories/openclaw-session-sandbox-escape-via-session-status-tool

https://github.com/openclaw/openclaw/security/advisories/GHSA-wcxr-59v9-rxr8

Details

Source: Mitre, NVD

Published: 2026-03-29

Updated: 2026-03-29

Risk Information

CVSS v2

Base Score: 6.2

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:N

Severity: Medium

CVSS v3

Base Score: 8.4

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N

Severity: High

CVSS v4

Base Score: 9.2

Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N

Severity: Critical