Critical Privilege Escalation Vulnerability in OpenClaw AI Agent Platform
Take action: If you use OpenClaw for AI automation, update to version 2026.3.31 ASAP to prevent unauthorized system access. Ensure your AI agents are isolated from sensitive internal networks to limit the impact of potential sandbox escapes.
Learn More
OpenClaw, an open-source AI agent platform used for workflow automation and task orchestration, has a critical security flaw that allows remote attackers to bypass sandbox restrictions, potentially compromising sensitive automated pipelines and internal data.
The vulnerability is tracked as CVE-2026-41329 (CVSS score 9.9) - A privilege escalation vulnerability in the heartbeat processing module of OpenClaw that are caused by improper context validation. By manipulating context inheritance mechanisms and the senderIsOwner parameter, attackers can bypass the platform's sandbox environment. This flaw allows for unauthorized control over the AI agent platform without requiring user interaction or prior credentials under specific deployment conditions.
OpenClaw often interacts directly with sensitive internal systems and data repositories. A successful exploit lets an attacker take over self-hosted instances, exposing API credentials for connected services and proprietary workflows.
This security issue specifically the OpenClaw npm package in all versions up to and including 2026.3.28. Users and organizations should update to version 2026.3.31 or later.
The CCB recommends treating this update with the highest priority. Additionally, security teams should increase monitoring to detect any signs of being already compromised, as patching only prevents future attacks.