Vulnerability Description
OpenClaw before 2026.2.24 contains a sandbox network isolation bypass vulnerability that allows trusted operators to join another container's network namespace. Attackers can configure the docker.network parameter with container:<id> values to reach services in target container namespaces and bypass network hardening controls.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openclaw | Openclaw | < 2026.2.24 |
Related Weaknesses (CWE)
References
- https://github.com/openclaw/openclaw/security/advisories/GHSA-ww6v-v748-x7g9Vendor Advisory
- https://www.vulncheck.com/advisories/openclaw-sandbox-network-isolation-bypass-vThird Party Advisory
FAQ
What is CVE-2026-32038?
CVE-2026-32038 is a vulnerability with a CVSS score of 9.8 (CRITICAL). OpenClaw before 2026.2.24 contains a sandbox network isolation bypass vulnerability that allows trusted operators to join another container's network namespace. Attackers can configure the docker.netw...
How severe is CVE-2026-32038?
CVE-2026-32038 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-32038?
Check the references section above for vendor advisories and patch information. Affected products include: Openclaw Openclaw.