CVE-2026-32038

OpenClaw · OpenClaw

OpenClaw versions before 2026.2.24 contain a sandbox network isolation bypass vulnerability allowing trusted operators to access other container networks.

Executive summary

OpenClaw is vulnerable to a critical network isolation bypass that allows authenticated operators to violate container boundaries and access restricted services.

Vulnerability

This flaw allows a trusted operator to join another container's network namespace by manipulating the docker.network parameter. By using container:<id> values, an attacker can bypass network hardening controls and reach services that should be isolated within other container namespaces.

Business impact

While this exploit requires "trusted operator" (authenticated) status, it represents a significant breakdown of the security model in containerized environments. An insider threat or a compromised operator account could use this to pivot across the infrastructure, accessing sensitive services or data in supposedly isolated containers. The CVSS score of 9.8 reflects the high potential for lateral movement.

Remediation

Immediate Action: Update OpenClaw to version 2026.2.24 or later to enforce proper network namespace isolation and prevent the bypass.

Proactive Monitoring: Audit container configuration changes and monitor for unusual inter-container network traffic that deviates from established security policies.

Compensating Controls: Implement strict IAM policies to limit who can modify container network parameters and use network-level micro-segmentation to provide defense-in-depth.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Container escape and isolation bypasses are high-impact events. Even though authentication is required, the potential for lateral movement within a cloud or data center environment is severe. Apply the 2026.2.24 update immediately to maintain the integrity of your container security boundaries.