[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-41329":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-21T11:17:02.443Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":28,"aliases":29,"duplicate_of":9,"upstream":31,"downstream":32,"duplicates":33,"related":34,"reserved_at":9,"published_at":35,"modified_at":35,"state":36,"summary":37,"references_raw":44,"kevs":72,"epss":9,"epss_history":73,"metrics":74,"affected":89},"CVE-2026-41329","OpenClaw before 2026.3.31 contains a sandbox bypass vulnerability allowing attackers to escalate privileges via heartbeat context inheritance and senderIsOwner parameter manipulation. Attackers can exploit improper context validation to bypass sandbox restrictions and achieve unauthorized privilege escalation.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-648","Incorrect Use of Privileged APIs","The product does not conform to the API requirements for a function call that requires extra privileges. This could allow attackers to gain privileges by causing the function to be called incorrectly.","weakness","Incomplete","Base","Low",[20,24],{"id":21,"name":22,"techniques":23},"CAPEC-107","Cross Site Tracing",[],{"id":25,"name":26,"techniques":27},"CAPEC-234","Hijacking a privileged process",[],[],[30],"GHSA-g5cg-8x5w-7jpm",[],[],[],[],"2026-04-20T23:08:16.222Z","Received",{"cisa_kev":38,"cisa_ransomware":38,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":39,"severity_score":40,"severity_version":41,"severity_source":42,"severity_vector":43,"severity_status":36},false,"critical",9.9,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",[45,53,58,63,68],{"url":46,"sources":47,"tags":50},"https://github.com/openclaw/openclaw/security/advisories/GHSA-g5cg-8x5w-7jpm",[42,48,49],"nvd","osv_npm",[51,52],"Vendor Advisory","WEB",{"url":54,"sources":55,"tags":56},"https://github.com/openclaw/openclaw/commit/a30214a624946fc5c85c9558a27c1580172374fd",[42,48,49],[57,52],"Patch",{"url":59,"sources":60,"tags":61},"https://www.vulncheck.com/advisories/openclaw-sandbox-bypass-via-heartbeat-context-inheritance-and-senderisowner-escalation",[42,48],[62],"Third Party Advisory",{"url":64,"sources":65,"tags":66},"https://github.com/openclaw/openclaw",[49],[67],"PACKAGE",{"url":69,"sources":70,"tags":71},"https://github.com/openclaw/openclaw/releases/tag/v2026.3.31",[49],[52],[],[],[75,83,87],{"source":42,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":76,"cvss_v4_0":80},{"baseScore":40,"baseSeverity":77,"vectorString":43,"impactScore":78,"exploitabilityScore":79},"CRITICAL",10,7.9,{"baseScore":81,"baseSeverity":77,"vectorString":82,"impactScore":9,"exploitabilityScore":9},9,"CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",{"source":48,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":84,"cvss_v4_0":85},{"baseScore":40,"baseSeverity":77,"vectorString":43,"impactScore":78,"exploitabilityScore":79},{"baseScore":81,"baseSeverity":77,"vectorString":86,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",{"source":49,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":9,"cvss_v4_0":88},{"baseScore":81,"baseSeverity":9,"vectorString":82,"impactScore":9,"exploitabilityScore":9},[90,101],{"ecosystem":91,"name":92,"vendor":91,"product":92,"cpe_part":9,"purl_type":93,"purl_namespace":9,"purl_name":92,"source":9,"versions":94},"Npm","openclaw","npm",[95],{"version":96,"is_range":97,"range_type":98,"version_start":9,"version_start_type":9,"version_end":99,"version_end_type":100,"fixed_in":9},"lt2026_3_31",true,"semver","2026.3.31","excluding",{"ecosystem":9,"name":102,"vendor":92,"product":92,"cpe_part":103,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":104},"OpenClaw","a",[105],{"version":106,"is_range":97,"range_type":42,"version_start":9,"version_start_type":9,"version_end":99,"version_end_type":100,"fixed_in":9},"\u003C 2026.3.31"]