CVE-2026-32038: OpenClaw has a sandbox network isolation bypass via docker.network=container:<id>
(updated )
In openclaw@2026.2.23, sandbox network hardening blocks network=host but still allows network=container:<id>.
This can let a sandbox join another container’s network namespace and reach services available in that namespace.
References
- github.com/advisories/GHSA-ww6v-v748-x7g9
- github.com/openclaw/openclaw
- github.com/openclaw/openclaw/commit/14b6eea6e
- github.com/openclaw/openclaw/commit/5552f9073
- github.com/openclaw/openclaw/security/advisories/GHSA-ww6v-v748-x7g9
- nvd.nist.gov/vuln/detail/CVE-2026-32038
- www.vulncheck.com/advisories/openclaw-sandbox-network-isolation-bypass-via-docker-network-container-parameter
Code Behaviors & Features
Detect and mitigate CVE-2026-32038 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →