top of page
perceptive_background_267k.jpg

OpenClaw versions prior to 2026.2.15 use SHA-1 to hash sandbox identifier cache keys for Docker and browser sandbox configurations, which is deprecated and vuln…

Published:

4 maart 2026 om 23:00:00

Alert date:

5 maart 2026 om 23:13:13

Source:

nvd.nist.gov

Click to open the original link from this advisory

Security Tools, Cloud & Virtualization

OpenClaw versions prior to 2026.2.15 contain a critical vulnerability where SHA-1 hashing is used for sandbox identifier cache keys in Docker and browser sandbox configurations. SHA-1 is deprecated and vulnerable to collision attacks. Attackers can exploit SHA-1 collisions to cause cache poisoning, allowing one sandbox configuration to be misinterpreted as another. This enables unsafe sandbox state reuse, potentially compromising sandbox security boundaries. The vulnerability affects both Docker and browser sandbox configurations within the OpenClaw platform.

Technical details

Mitigation steps:

Affected products:

OpenClaw

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page