<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-32915 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-32915/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 29 Mar 2026 13:16:59 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-32915/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Sandbox Boundary Bypass Vulnerability (CVE-2026-32915)</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-sandbox-bypass/</link><pubDate>Sun, 29 Mar 2026 13:16:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-sandbox-bypass/</guid><description>OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability that allows low-privilege leaf subagents to access the subagents control surface and execute commands with broader tool policies due to insufficient authorization checks, potentially leading to privilege escalation and unauthorized control of sibling processes.</description><content:encoded>&lt;p>CVE-2026-32915 describes a critical sandbox escape vulnerability affecting OpenClaw versions prior to 2026.3.11. The flaw resides in the insufficient authorization checks implemented on subagent control requests. A low-privilege sandboxed leaf worker can exploit this to bypass the intended sandbox boundaries and access the subagents control surface. This allows the attacker to resolve requests against the parent requester scope, instead of being limited to their own session tree. This…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sandbox-escape</category><category>privilege-escalation</category><category>cve-2026-32915</category></item></channel></rss>