๐Ÿ” CVE Alert

CVE-2026-27646

MEDIUM 6.1

OpenClaw < 2026.3.7 - Sandbox Escape via /acp spawn Command

CVSS Score
6.1
EPSS Score
0.0%
EPSS Percentile
1th

OpenClaw versions prior to 2026.3.7 contain a sandbox escape vulnerability in the /acp spawn command that allows authorized sandboxed sessions to initialize host-side ACP runtime. Attackers can bypass sandbox restrictions by invoking the /acp spawn slash-command to cross from sandboxed chat context into host-side ACP session initialization when ACP is enabled.

CWE CWE-863
Vendor openclaw
Product openclaw
Published Mar 23, 2026
Last Updated Mar 25, 2026
Stay Ahead of the Next One

Get instant alerts for openclaw openclaw

Be the first to know when new medium vulnerabilities affecting openclaw openclaw are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
None

Affected Versions

OpenClaw / OpenClaw
0 < 2026.3.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openclaw/openclaw/security/advisories/GHSA-9q36-67vc-rrwg github.com: https://github.com/openclaw/openclaw/commit/61000b8e4ded919ca1a825d4700db4cb3fdc56e3 vulncheck.com: https://vulncheck.com/advisories/openclaw-mar-sandbox-escape-via-acp-spawn-command

Credits

๐Ÿ” tdjackey