CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



GHSA-WCXR-59V9-RXR8
9.90.04%

GHSA-WCXR-59V9-RXR8: Sandbox Escape via Improper Authorization in OpenClaw session_status Tool

Alon Barad
Alon Barad
Software Engineer

Mar 14, 2026·5 min read·2 visits

PoC Available

Executive Summary (TL;DR)

OpenClaw versions prior to v2026.3.11 contain a critical authorization bypass in the `session_status` tool. Sandboxed subagents can supply a parent session key to access restricted metadata and API keys, breaking the intended isolation boundaries. Users must upgrade to v2026.3.11 or restrict the tool's usage via policy configuration.

The OpenClaw `session_status` tool fails to properly validate authorization boundaries when processing the `sessionKey` parameter. This flaw allows restricted sandboxed subagents to read or influence the state of higher-privileged parent sessions, resulting in a critical sandbox escape.

Vulnerability Overview

OpenClaw utilizes a hierarchical architecture where main agents can spawn sandboxed subagents to perform specific, isolated tasks. These subagents are intentionally restricted to their own session context to prevent unauthorized access to the broader system or the parent agent's state.

The built-in session_status tool provides agents with the ability to query session metadata and execution status. A vulnerability exists within this tool due to improper authorization checks. The tool accepts a sessionKey parameter to determine which session to query but fails to enforce session-visibility boundaries.

Without proper access control validation, a sandboxed subagent can supply the sessionKey of a parent or sibling session to the session_status tool. The tool processes the request and returns the target session's state to the unauthorized subagent.

This behavior constitutes a sandbox escape (CWE-693). The subagent breaches its restricted context, gaining the ability to inspect or influence sessions that should be strictly inaccessible.

Root Cause Analysis

The underlying flaw resides in the implementation of the session_status tool, located in src/agents/tools/session-status-tool.ts. The code processes the optional sessionKey parameter strictly as a routing selector rather than an authorization token.

When a sessionKey is provided, the tool retrieves the session state associated with that specific key from the underlying data store. However, the implementation lacks a mandatory validation step to verify the relationship between the calling agent and the requested session.

The system fails to check if the caller possesses a valid "parent-child" or explicitly shared relationship with the target sessionKey. Consequently, the tool blindly trusts the input and returns the data to whichever agent issued the request.

Exploitation of this root cause is highly reliable because parent session keys frequently follow predictable naming conventions, such as agent:main:user:123. In many OpenClaw configurations, these keys are also inadvertently exposed to subagents via environment variables or shared metadata.

Code Analysis and Patch Mechanics

In versions prior to v2026.3.11, the session_status tool queried the session data without verifying ownership. The vulnerable logic simply extracted the sessionKey from the tool parameters and passed it to the state manager.

The official patch (PR #43754) introduces explicit session-tree visibility checks. The updated implementation intercepts the tool execution and validates that the requested sessionKey belongs to either the caller's own session or a direct descendant in the agent's task tree.

// Pseudo-code representation of the patch logic
const requestedKey = parameters.sessionKey || currentAgent.sessionKey;
 
// Added Validation Guard
if (!SessionTree.isDescendantOrSelf(currentAgent.sessionKey, requestedKey)) {
  if (!PolicyGuard.hasExplicitSharedAccess(currentAgent, requestedKey)) {
    throw new Error("Unauthorized access to session state");
  }
}
 
const sessionData = await StateManager.getSession(requestedKey);

Furthermore, the patch implements an owner-only marking system for sensitive data nodes. Even when an authorized agent queries a valid session, high-privileged metadata such as provider API keys are redacted from the status output, ensuring a defense-in-depth approach against data leakage.

Exploitation and Attack Methodology

Exploitation requires an attacker to control the execution flow of a subagent within the OpenClaw environment. This scenario typically arises when a main agent spawns a subagent to process untrusted input or perform external research tasks.

The attacker first instructs the subagent to identify the parent session key. The subagent can achieve this by inspecting its local environment variables or by guessing the key based on predictable sequential naming conventions.

Once the target sessionKey is identified, the subagent invokes the session_status tool using a standard tool-call payload. The attacker crafts the parameters to explicitly target the parent session.

{
  "tool": "session_status",
  "parameters": {
    "sessionKey": "agent:main:user:123"
  }
}

The tool processes the unauthorized request and returns the full state of the main agent's session. The subagent receives this sensitive data, completing the access control bypass and sandbox escape.

Impact Assessment

The vulnerability carries a critical CVSS score of 9.9. The "Scope: Changed" (S:C) metric accurately reflects the subagent's ability to compromise the parent system context, breaking the fundamental isolation guarantees of the OpenClaw architecture.

Successful exploitation results in severe data leakage. The unauthorized subagent gains direct read access to the parent session's state. This state typically contains highly sensitive information, including provider API keys, previous conversation histories, and internal configuration parameters.

Beyond data exposure, the leaked information can enable further attacks. An attacker can leverage extracted API keys or configuration data to manipulate the parent agent's execution context, escalate privileges, or move laterally within the deployment environment.

> [!NOTE] > The EPSS score for this vulnerability is currently low (0.04%). This reflects a lack of observed exploitation in the wild at the time of publication, but the availability of a functional Proof of Concept dictates immediate remediation.

Remediation and Mitigation Guidance

The primary and most effective remediation is to upgrade OpenClaw to version v2026.3.11. This release incorporates the necessary access control validation, session-tree checks, and data redaction mechanisms required to secure the session_status tool.

For environments where immediate patching is not possible, administrators must implement policy-based mitigations. Security teams should audit the src/agents/pi-tools.policy.ts configuration file to review tool assignment policies.

Administrators must restrict the availability of the session_status tool. Ensure the tool is only granted to trusted agents that strictly require it for operational purposes, and explicitly remove it from the tool profiles of any untrusted or externally-facing subagents.

Finally, organizations should monitor tool execution logs for anomalous cross-session access attempts. Invocations of the session_status tool where the sessionKey parameter differs from the caller's context should trigger immediate security alerts.

Official Patches

OpenClawOpenClaw Security Advisory
OpenClawOpenClaw Release Notes v2026.3.11

Technical Appendix

CVSS Score
9.9/ 10
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
EPSS Probability
0.04%
Top 88% most exploited

Affected Systems

OpenClaw < v2026.3.11ClawdBot < v2026.3.11MoltBot < v2026.3.11

Affected Versions Detail

Product
Affected Versions
Fixed Version
OpenClaw
OpenClaw
< v2026.3.11v2026.3.11
AttributeDetail
CWE IDCWE-285, CWE-639, CWE-693
Attack VectorNetwork (Adjacent/Sandboxed Agent)
CVSS Score9.9 (Critical)
EPSS Score0.00043
ImpactData Leakage, Sandbox Escape, Privilege Escalation
Exploit StatusProof of Concept (PoC) Available

MITRE ATT&CK Mapping

T1068Exploitation for Privilege Escalation
Privilege Escalation
T1528Steal Application Access Token
Credential Access
CWE-285
Improper Authorization

Improper Authorization

Known Exploits & Detection

Snyk LabsTechnical analysis and exploit paths documented by Snyk Labs

Vulnerability Timeline

Initial discovery of sandbox bypass by security researchers
2026-03-02
Internal reproduction by the OpenClaw core team
2026-03-05
Patch PR #43754 merged
2026-03-11
Public disclosure and release of OpenClaw v2026.3.11
2026-03-12
GitHub Advisory GHSA-WCXR-59V9-RXR8 published
2026-03-12

References & Sources

  • [1]GitHub Advisory Database: GHSA-WCXR-59V9-RXR8
  • [2]OpenClaw Security Advisory
  • [3]OpenClaw Release Notes v2026.3.11
  • [4]Snyk Labs Analysis: Bypass OpenClaw Security Sandbox
  • [5]OpenClaw Docs (Security)

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.