CVE-2026-28479 PUBLISHED

OpenClaw < 2026.2.15 - Cache Poisoning via Deprecated SHA-1 Hash in Sandbox Configuration

Assigner: VulnCheck
Reserved: 27.02.2026 Published: 05.03.2026 Updated: 09.03.2026

OpenClaw versions prior to 2026.2.15 use SHA-1 to hash sandbox identifier cache keys for Docker and browser sandbox configurations, which is deprecated and vulnerable to collision attacks. An attacker can exploit SHA-1 collisions to cause cache poisoning, allowing one sandbox configuration to be misinterpreted as another and enabling unsafe sandbox state reuse.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 0 to 2026.2.15 (excl.)

Credits

  • @kexinoh (of Tencent zhuque Lab, by https://github.com/Tencent/AI-Infra-Guard) reporter

References

Problem Types

  • Use of a Broken or Risky Cryptographic Algorithm CWE