CVE-2026-32038
CRITICALOpenClaw - Sandbox Network Isolation Bypass via docker.network=container Parameter
Title source: cnaDescription
OpenClaw before 2026.2.24 contains a sandbox network isolation bypass vulnerability that allows trusted operators to join another container's network namespace. Attackers can configure the docker.network parameter with container:<id> values to reach services in target container namespaces and bypass network hardening controls.
Scores
CVSS v3
9.8
EPSS
0.0006
EPSS Percentile
19.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-284
Status
published
Products (3)
npm/openclaw
0 - 2026.2.24npm
OpenClaw/OpenClaw
< 2026.2.24
OpenClaw/OpenClaw
2026.2.24
Published
Mar 19, 2026
Tracked Since
Mar 20, 2026