<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>OpenClaw (&gt;= 2026.4.5, &lt; 2026.4.10) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/openclaw--2026.4.5--2026.4.10/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 12:16:17 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/openclaw--2026.4.5--2026.4.10/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Sandbox Escape Vulnerability (CVE-2026-42434)</title><link>https://feed.craftedsignal.io/briefs/2026-05-openclaw-sandbox-escape/</link><pubDate>Tue, 05 May 2026 12:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-openclaw-sandbox-escape/</guid><description>OpenClaw versions 2026.4.5 before 2026.4.10 contain a sandbox escape vulnerability (CVE-2026-42434) that allows attackers to bypass sandbox boundaries and route execution to remote nodes by overriding exec routing.</description><content:encoded><![CDATA[<p>OpenClaw versions 2026.4.5 before 2026.4.10 are vulnerable to a sandbox escape vulnerability, identified as CVE-2026-42434. This flaw allows attackers to bypass the intended sandbox boundaries. By exploiting this vulnerability, a sandboxed agent can override the exec routing mechanism, directing execution to unintended remote nodes instead of the intended sandbox paths. This could lead to unauthorized access and control over the OpenClaw environment. This vulnerability was reported on May 5th, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a sandboxed OpenClaw agent.</li>
<li>The attacker crafts a malicious request to execute a command.</li>
<li>The request includes a manipulated <code>host</code> parameter set to <code>node</code>, overriding the intended execution path.</li>
<li>OpenClaw&rsquo;s exec routing mechanism incorrectly processes the request due to the vulnerability in versions prior to 2026.4.10.</li>
<li>Instead of executing within the sandbox, the command is routed to a remote node.</li>
<li>The remote node executes the command with the privileges of the OpenClaw agent.</li>
<li>The attacker gains unauthorized access and control over the remote node.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to bypass sandbox restrictions within OpenClaw. This can lead to privilege escalation and unauthorized access to sensitive resources on remote nodes. The impact includes potential data breaches, system compromise, and the ability to execute arbitrary code outside the intended sandbox environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.10 or later to patch CVE-2026-42434.</li>
<li>Monitor OpenClaw agent logs for suspicious exec routing requests, especially those with <code>host=node</code> parameters.</li>
<li>Implement network segmentation to limit the impact of compromised nodes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sandbox escape</category><category>privilege escalation</category><category>cve-2026-42434</category></item></channel></rss>