/ data / vuln / openclaw / CVE-2026-32046.yaml
CVE-2026-32046.yaml
 1  info:
 2    name: OpenClaw
 3    cve: CVE-2026-32046
 4    summary: OpenClaw 2026.2.21 之前版本存在沙箱配置不当漏洞,可导致任意代码执行
 5    details: OpenClaw 2026.2.21 之前版本存在沙箱配置不当漏洞,攻击者无需沙箱逃逸即可通过利用渲染器端漏洞执行任意代码。攻击者可利用 Chromium 浏览器容器中被禁用的操作系统级沙箱保护,在宿主系统上实现代码执行。
 6    cvss: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
 7    severity: MEDIUM
 8    security_advise: 升级 OpenClaw 至 2026.2.21 或更高版本。
 9    references:
10    - https://github.com/openclaw/openclaw/commit/1835dec2004fe7a62c6a7ba46b8485f124ec6199
11    - https://github.com/openclaw/openclaw/commit/e7eba01efc4c3c400e9cfd3ce3d661cbc788a631
12    - https://github.com/openclaw/openclaw/security/advisories/GHSA-43x4-g22p-3hrq
13    - https://www.vulncheck.com/advisories/openclaw-os-level-sandbox-bypass-via-no-sandbox-flag
14  rule: version < "2026.2.21"
15  references:
16  - https://github.com/openclaw/openclaw/commit/1835dec2004fe7a62c6a7ba46b8485f124ec6199
17  - https://github.com/openclaw/openclaw/commit/e7eba01efc4c3c400e9cfd3ce3d661cbc788a631
18  - https://github.com/openclaw/openclaw/security/advisories/GHSA-43x4-g22p-3hrq
19  - https://www.vulncheck.com/advisories/openclaw-os-level-sandbox-bypass-via-no-sandbox-flag