


Perceptive Security
SOC/SIEM Consultancy

OpenClaw before 2026.3.31 contains a sandbox bypass vulnerability allowing attackers to escalate privileges via heartbeat context inheritance and senderIsOwner …
Published:
20 april 2026 om 22:00:00
Alert date:
21 april 2026 om 17:05:49
Source:
nvd.nist.gov
Security Tools
CVE-2026-41329 affects OpenClaw versions before 2026.3.31, containing a sandbox bypass vulnerability that allows privilege escalation. Attackers can exploit heartbeat context inheritance and manipulate the senderIsOwner parameter to bypass sandbox restrictions. The vulnerability stems from improper context validation within the application. This enables unauthorized privilege escalation, potentially allowing attackers to break out of security sandboxes. The issue has been documented with proof-of-concept code and security advisories available on GitHub.
Technical details
Mitigation steps:
Affected products:
OpenClaw
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-41329
https://github.com/openclaw/openclaw/commit/a30214a624946fc5c85c9558a27c1580172374fd
https://github.com/openclaw/openclaw/security/advisories/GHSA-g5cg-8x5w-7jpm
https://www.vulncheck.com/advisories/openclaw-sandbox-bypass-via-heartbeat-context-inheritance-and-senderisowner-escalation
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
