CVE-2026-41329
Aliases:GHSA-g5cg-8x5w-7jpm
Received
Published: 20 Apr 2026, 23:08
Last modified:20 Apr 2026, 23:08
Vulnerability Summary
Overall Risk (default)
high
70/100 CVSS Score
9.9 CRITICAL
v3.1 (cve.org)
EPSS Score
No data
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
20 Apr 2026, 23:08
Published
Vulnerability first disclosed
Description
OpenClaw before 2026.3.31 contains a sandbox bypass vulnerability allowing attackers to escalate privileges via heartbeat context inheritance and senderIsOwner parameter manipulation. Attackers can exploit improper context validation to bypass sandbox restrictions and achieve unauthorized privilege escalation.
CVSS Metrics
- v4.0•CRITICAL•Score: 9CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
- v4.0•CRITICAL•Score: 9CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- v3.1•CRITICAL•Score: 9.9CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Techniques & Countermeasures
- CWE-648•Incorrect Use of Privileged APIs
The product does not conform to the API requirements for a function call that requires extra privileges. This could allow attackers to gain privileges by causing the function to be called incorrectly.
Affected Systems
- Npm•openclaw
< 2026.3.31
- openclaw•openclaw
< 2026.3.31
References (5)
- https://github.com/openclaw/openclaw/security/advisories/GHSA-g5cg-8x5w-7jpm
- https://github.com/openclaw/openclaw/commit/a30214a624946fc5c85c9558a27c1580172374fd
- https://www.vulncheck.com/advisories/openclaw-sandbox-bypass-via-heartbeat-context-inheritance-and-senderisowner-escalation
- https://github.com/openclaw/openclaw
- https://github.com/openclaw/openclaw/releases/tag/v2026.3.31