๐Ÿ” CVE Alert

CVE-2026-27007

UNKNOWN 0.0

OpenClaw's sandbox config hash sorted primitive arrays and suppressed needed container recreation

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, `normalizeForHash` in `src/agents/sandbox/config-hash.ts` recursively sorted arrays that contained only primitive values. This made order-sensitive sandbox configuration arrays hash to the same value even when order changed. In OpenClaw sandbox flows, this hash is used to decide whether existing sandbox containers should be recreated. As a result, order-only config changes (for example Docker `dns` and `binds` array order) could be treated as unchanged and stale containers could be reused. This is a configuration integrity issue affecting sandbox recreation behavior. Starting in version 2026.2.15, array ordering is preserved during hash normalization; only object key ordering remains normalized for deterministic hashing.

CWE CWE-1254
Vendor openclaw
Product openclaw
Published Feb 19, 2026
Last Updated Feb 20, 2026
Stay Ahead of the Next One

Get instant alerts for openclaw openclaw

Be the first to know when new unknown vulnerabilities affecting openclaw openclaw are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

openclaw / openclaw
< 2026.2.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openclaw/openclaw/security/advisories/GHSA-xxvh-5hwj-42pp github.com: https://github.com/openclaw/openclaw/commit/41ded303b4f6dae5afa854531ff837c3276ad60b github.com: https://github.com/openclaw/openclaw/releases/tag/v2026.2.15