PT-2026-27223 · Openclaw · Openclaw
Tdjackey
·
Published
2026-03-23
·
Updated
2026-03-23
·
CVE-2026-27646
CVSS v3.1
5.3
Medium
| AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N |
OpenClaw versions prior to 2026.3.7 contain a sandbox escape vulnerability in the /acp spawn command that allows authorized sandboxed sessions to initialize host-side ACP runtime. Attackers can bypass sandbox restrictions by invoking the /acp spawn slash-command to cross from sandboxed chat context into host-side ACP session initialization when ACP is enabled.
Fix
Incorrect Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Openclaw