top of page
perceptive_background_267k.jpg

OpenClaw before 2026.3.31 contains a sandbox bypass vulnerability allowing attackers to escalate privileges via heartbeat context inheritance and senderIsOwner …

Published:

20 april 2026 om 22:00:00

Alert date:

21 april 2026 om 17:05:49

Source:

nvd.nist.gov

Click to open the original link from this advisory

Security Tools

CVE-2026-41329 affects OpenClaw versions before 2026.3.31, containing a sandbox bypass vulnerability that allows privilege escalation. Attackers can exploit heartbeat context inheritance and manipulate the senderIsOwner parameter to bypass sandbox restrictions. The vulnerability stems from improper context validation within the application. This enables unauthorized privilege escalation, potentially allowing attackers to break out of security sandboxes. The issue has been documented with proof-of-concept code and security advisories available on GitHub.

Technical details

Mitigation steps:

Affected products:

OpenClaw

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page