CVE-2026-27007: OpenClaw's sandbox config hash sorted primitive arrays and suppressed needed container recreation
(updated )
normalizeForHash in src/agents/sandbox/config-hash.ts recursively sorted arrays that contained only primitive values. This made order-sensitive sandbox configuration arrays hash to the same value even when order changed.
In OpenClaw sandbox flows, this hash is used to decide whether existing sandbox containers should be recreated. As a result, order-only config changes (for example Docker dns and binds array order) could be treated as unchanged and stale containers could be reused.
This is a configuration integrity issue affecting sandbox recreation behavior.
References
- github.com/advisories/GHSA-xxvh-5hwj-42pp
- github.com/openclaw/openclaw
- github.com/openclaw/openclaw/commit/41ded303b4f6dae5afa854531ff837c3276ad60b
- github.com/openclaw/openclaw/releases/tag/v2026.2.15
- github.com/openclaw/openclaw/security/advisories/GHSA-xxvh-5hwj-42pp
- nvd.nist.gov/vuln/detail/CVE-2026-27007
Code Behaviors & Features
Detect and mitigate CVE-2026-27007 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →