#VU125122 Improper privilege management in OpenClaw
Published: April 8, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote user to bypass the sandbox boundary and initialize the host-side ACP runtime.
The vulnerability exists due to improper privilege management in sessions_spawn(runtime="acp") when handling sandboxed spawn requests. A remote privileged user can invoke sessions_spawn with runtime="acp" to bypass the sandbox boundary and initialize the host-side ACP runtime.
The issue arises because sandbox inheritance checks enforced for runtime="subagent" were not equivalently enforced for runtime="acp".