CVE-2026-32048
Summary
A sandboxed session could use cross-agent sessions_spawn to create a child under an agent configured with sandbox.mode="off", downgrading runtime confinement.
Impact
In mixed-agent setups that allow cross-agent spawning, a sandboxed requester could escape into an unsandboxed child runtime.
Fix
Spawn-time sandbox inheritance is now enforced: if the requester is sandboxed and the resolved child runtime would be unsandboxed, spawn is rejected.
Affected and Patched Versions
- Affected:
<= 2026.2.26 - Patched:
2026.3.1
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/openclaw/openclaw/security/advisories/GHSA-p7gr-f84w-hqg5, https://nvd.nist.gov/vuln/detail/CVE-2026-32048, https://github.com/openclaw/openclaw, https://www.vulncheck.com/advisories/openclaw-sandbox-escape-via-cross-agent-sessions-spawn
