CVE-2026-32046.yaml
1 info: 2 name: OpenClaw 3 cve: CVE-2026-32046 4 summary: OpenClaw 2026.2.21 之前版本存在沙箱配置不当漏洞,可导致任意代码执行 5 details: OpenClaw 2026.2.21 之前版本存在沙箱配置不当漏洞,攻击者无需沙箱逃逸即可通过利用渲染器端漏洞执行任意代码。攻击者可利用 Chromium 浏览器容器中被禁用的操作系统级沙箱保护,在宿主系统上实现代码执行。 6 cvss: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L 7 severity: MEDIUM 8 security_advise: 升级 OpenClaw 至 2026.2.21 或更高版本。 9 references: 10 - https://github.com/openclaw/openclaw/commit/1835dec2004fe7a62c6a7ba46b8485f124ec6199 11 - https://github.com/openclaw/openclaw/commit/e7eba01efc4c3c400e9cfd3ce3d661cbc788a631 12 - https://github.com/openclaw/openclaw/security/advisories/GHSA-43x4-g22p-3hrq 13 - https://www.vulncheck.com/advisories/openclaw-os-level-sandbox-bypass-via-no-sandbox-flag 14 rule: version < "2026.2.21" 15 references: 16 - https://github.com/openclaw/openclaw/commit/1835dec2004fe7a62c6a7ba46b8485f124ec6199 17 - https://github.com/openclaw/openclaw/commit/e7eba01efc4c3c400e9cfd3ce3d661cbc788a631 18 - https://github.com/openclaw/openclaw/security/advisories/GHSA-43x4-g22p-3hrq 19 - https://www.vulncheck.com/advisories/openclaw-os-level-sandbox-bypass-via-no-sandbox-flag