CVE-2026-32038
Severity CVSS v4.0:
CRITICAL
Type:
CWE-284
Improper Access Control
Publication date:
19/03/2026
Last modified:
23/03/2026
Description
OpenClaw before 2026.2.24 contains a sandbox network isolation bypass vulnerability that allows trusted operators to join another container's network namespace. Attackers can configure the docker.network parameter with container: values to reach services in target container namespaces and bypass network hardening controls.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | 2026.2.24 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



