CVE-2026-41329 PUBLISHED

OpenClaw < 2026.3.31 - Sandbox Bypass via Heartbeat Context Inheritance and senderIsOwner Escalation

Assigner: VulnCheck
Reserved: 20.04.2026 Published: 20.04.2026 Updated: 20.04.2026

OpenClaw before 2026.3.31 contains a sandbox bypass vulnerability allowing attackers to escalate privileges via heartbeat context inheritance and senderIsOwner parameter manipulation. Attackers can exploit improper context validation to bypass sandbox restrictions and achieve unauthorized privilege escalation.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS Score: 9

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 0 to 2026.3.31 (excl.)
  • Version 2026.3.31 is unaffected

Credits

  • AntAISecurityLab reporter

References

Problem Types

  • CWE-648: Incorrect Use of Privileged APIs CWE