Platform
nodejs
Component
openclaw
Fixed in
2026.3.11
2026.3.11
CVE-2026-32918 is a high-severity vulnerability affecting openclaw versions up to 2026.3.8. This flaw allows a sandboxed child session to bypass visibility boundaries and access data from parent or sibling sessions, potentially leading to unauthorized modification of session state. The vulnerability has been patched in openclaw version 2026.3.11 and subsequent releases.
The core impact of CVE-2026-32918 lies in the ability of a sandboxed subagent to escape its intended isolation. An attacker controlling a malicious subagent could leverage this vulnerability to read sensitive data belonging to other sessions within the openclaw environment. Crucially, in affected releases, the attacker could also update the target session's persisted model override, effectively hijacking the session's behavior. This could lead to data breaches, privilege escalation, and potentially complete compromise of the application relying on openclaw. The ability to modify persisted models represents a particularly severe risk, as it could allow attackers to establish persistent backdoors or manipulate application logic.
CVE-2026-32918 was publicly disclosed on March 13, 2026. The vulnerability's impact stems from a fundamental flaw in session visibility enforcement, making it potentially attractive to attackers seeking to bypass security controls. There is currently no indication of active exploitation campaigns targeting this vulnerability, nor are there any publicly available proof-of-concept exploits. The vulnerability has not been added to the CISA KEV catalog at the time of this writing.
Exploit Status
EPSS
0.01% (2% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2026-32918 is to upgrade openclaw to version 2026.3.11 or a later release that incorporates the fix. If immediate upgrading is not feasible due to compatibility concerns or breaking changes, consider implementing stricter session isolation policies within your openclaw configuration. While not a complete solution, this can limit the potential impact of a successful exploit. Review your openclaw configuration to ensure that subagents have the minimum necessary permissions and access rights. Monitor openclaw logs for any unusual activity or attempts to access session data outside of the expected scope. After upgrading, confirm the fix by attempting to launch a sandboxed subagent and verifying that it cannot access data from other sessions.
Update OpenClaw to version 2026.3.11 or later. This version fixes the session sandbox escape vulnerability in the session_status tool, preventing sandboxed subagents from accessing the parent or sibling session state.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-32918 is a high-severity vulnerability in openclaw versions up to 2026.3.8 that allows a sandboxed subagent to access and potentially modify data from other sessions, bypassing intended security boundaries.
You are affected if you are using openclaw versions 2026.3.8 or earlier. Check your installed version using npm list openclaw.
Upgrade openclaw to version 2026.3.11 or a later release. If upgrading is not immediately possible, implement stricter session isolation policies.
There is currently no evidence of active exploitation campaigns targeting CVE-2026-32918, but the vulnerability's impact warrants immediate attention.
Refer to the openclaw project's official security advisories and release notes for detailed information and updates regarding CVE-2026-32918.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.