Cyber Posture

CVE-2026-32038

CriticalPublic PoC

Published: 19 March 2026

Published
19 March 2026
Modified
23 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 19.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32038 is a critical-severity Improper Access Control (CWE-284) vulnerability in Openclaw Openclaw. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 19.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SC-39 (Process Isolation) and SC-7 (Boundary Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the CVE by requiring timely identification, reporting, and correction of the sandbox network isolation bypass flaw in OpenClaw prior to 2026.2.24.

prevent

Mandates process isolation techniques, such as network namespaces, to prevent trusted operators from joining another container's network namespace.

preventdetect

Enforces boundary protection at internal network interfaces between containers to block unauthorized access to services despite namespace bypass attempts.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1611 Escape to Host Privilege Escalation
Adversaries may break out of a container or virtualized environment to gain access to the underlying host.
T1562.004 Disable or Modify System Firewall Stealth
Adversaries may disable or modify system firewalls in order to bypass controls limiting network usage.
Why these techniques?

CVE enables remote exploitation of the OpenClaw service (T1190) to bypass container network isolation controls via docker.network configuration, directly facilitating container namespace escape (T1611) and modification of network/firewall hardening (T1562.004).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenClaw before 2026.2.24 contains a sandbox network isolation bypass vulnerability that allows trusted operators to join another container's network namespace. Attackers can configure the docker.network parameter with container:<id> values to reach services in target container namespaces and bypass network hardening…

more

controls.

Deeper analysisAI

CVE-2026-32038 is a sandbox network isolation bypass vulnerability (CWE-284) affecting OpenClaw versions before 2026.2.24. The flaw enables trusted operators to join another container's network namespace by configuring the docker.network parameter with container:<id> values, allowing access to services in target container namespaces and bypassing network hardening controls. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and lack of required privileges or user interaction.

Attackers able to configure the docker.network parameter, such as trusted operators in a containerized environment, can exploit this vulnerability remotely. By specifying a target container ID, they join its network namespace, gaining unauthorized access to isolated services across containers. This bypasses intended network segmentation, potentially enabling data exfiltration, service disruption, or further compromise with high impacts on confidentiality, integrity, and availability.

Mitigation involves upgrading to OpenClaw 2026.2.24 or later, as indicated by the affected version range. Detailed remediation guidance is available in the official advisories at https://github.com/openclaw/openclaw/security/advisories/GHSA-ww6v-v748-x7g9 and https://www.vulncheck.com/advisories/openclaw-sandbox-network-isolation-bypass-via-docker-network-container-parameter.

Details

CWE(s)

Affected Products

openclaw
openclaw
≤ 2026.2.24

CVEs Like This One

CVE-2026-26325Same product: Openclaw Openclaw
CVE-2026-28465Same product: Openclaw Openclaw
CVE-2026-31998Same product: Openclaw Openclaw
CVE-2026-32975Same product: Openclaw Openclaw
CVE-2026-35629Same product: Openclaw Openclaw
CVE-2026-22171Same product: Openclaw Openclaw
CVE-2026-31989Same product: Openclaw Openclaw
CVE-2026-35622Same product: Openclaw Openclaw
CVE-2026-41912Same product: Openclaw Openclaw
CVE-2026-42439Same product: Openclaw Openclaw

References