CVE-2026-32038 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: March 19, 2026
OpenClaw - Authentication Bypass
Overview
OpenClaw before 2026.2.24 contains a sandbox network isolation bypass caused by improper validation of docker.network parameter, letting trusted operators join another container's network namespace, exploit requires trusted operator privileges.
Severity & Score
Impact
Trusted operators can bypass network isolation, accessing other container networks and services, compromising container security.
Mitigation
Update to version 2026.2.24 or later.
References
Social Media Activity(2 posts)
š“ CVE-2026-32038 - Critical (9.8) OpenClaw before 2026.2.24 contains a sandbox network isolation bypass vulnerability that allows trusted operators to join another container's network namespace. Attackers can configure the docker.network parameter with container: values to reach s... š https://www.thehackerwire.com/vulnerability/CVE-2026-32038/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš“ CVE-2026-32038 - Critical (9.8) OpenClaw before 2026.2.24 contains a sandbox network isolation bypass vulnerability that allows trusted operators to join another container's network namespace. Attackers can configure the docker.network parameter with container: values to reach s... š https://www.thehackerwire.com/vulnerability/CVE-2026-32038/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-32038
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- broken_access_control
- Status
- new
- EPSS
- 0.0%
- Social Posts
- 2
CWE
- CWE-284
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H