Improper access control in OpenClaw - CVE-2026-32038
Published: May 1, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote user to bypass sandbox network isolation.
The vulnerability exists due to improper access control in sandbox Docker network mode validation when processing trusted sandbox network configuration. A remote user can set the sandbox network mode to container:<id> to bypass sandbox network isolation.
Exploitation requires the ability to influence trusted sandbox network configuration, such as agents.defaults.sandbox.docker.network, and may allow access to services reachable within another container's network namespace.