CVE-2026-28479
Severity CVSS v4.0:
HIGH
Type:
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
Publication date:
05/03/2026
Last modified:
17/03/2026
Description
OpenClaw versions prior to 2026.2.15 use SHA-1 to hash sandbox identifier cache keys for Docker and browser sandbox configurations, which is deprecated and vulnerable to collision attacks. An attacker can exploit SHA-1 collisions to cause cache poisoning, allowing one sandbox configuration to be misinterpreted as another and enabling unsafe sandbox state reuse.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openclaw:openclaw:*:-:*:*:*:node.js:*:* | 2026.2.15 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



