


Perceptive Security
SOC/SIEM Consultancy

OpenClaw versions prior to 2026.2.15 use SHA-1 to hash sandbox identifier cache keys for Docker and browser sandbox configurations, which is deprecated and vuln…
Published:
4 maart 2026 om 23:00:00
Alert date:
5 maart 2026 om 23:13:13
Source:
nvd.nist.gov
Security Tools, Cloud & Virtualization
OpenClaw versions prior to 2026.2.15 contain a critical vulnerability where SHA-1 hashing is used for sandbox identifier cache keys in Docker and browser sandbox configurations. SHA-1 is deprecated and vulnerable to collision attacks. Attackers can exploit SHA-1 collisions to cause cache poisoning, allowing one sandbox configuration to be misinterpreted as another. This enables unsafe sandbox state reuse, potentially compromising sandbox security boundaries. The vulnerability affects both Docker and browser sandbox configurations within the OpenClaw platform.
Technical details
Mitigation steps:
Affected products:
OpenClaw
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-28479
https://github.com/openclaw/openclaw/commit/559c8d9930eebb5356506ff1a8cd3dbaec92be77
https://github.com/openclaw/openclaw/security/advisories/GHSA-fh3f-q9qw-93j9
https://www.vulncheck.com/advisories/openclaw-cache-poisoning-via-deprecated-sha-hash-in-sandbox-configuration
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
