No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 23 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 21 Mar 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.2.21 contain an improper sandbox configuration vulnerability that allows attackers to execute arbitrary code by exploiting renderer-side vulnerabilities without requiring a sandbox escape. Attackers can leverage the disabled OS-level sandbox protections in the Chromium browser container to achieve code execution on the host system. | |
| Title | OpenClaw < 2026.2.21 - OS-level Sandbox Bypass via --no-sandbox Flag | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-1188 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-23T17:44:28.975Z
Reserved: 2026-03-10T19:48:44.965Z
Link: CVE-2026-32046
Updated: 2026-03-23T17:44:25.794Z
Status : Analyzed
Published: 2026-03-21T01:17:07.313
Modified: 2026-03-24T19:12:10.887
Link: CVE-2026-32046
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:33:27Z