CVE-2026-32038: OpenClaw has a sandbox network isolation bypass via docker.network=container:<id>
(updated )
In openclaw@2026.2.23, sandbox network hardening blocks network=host but still allows network=container:<id>.
This can let a sandbox join another container’s network namespace and reach services available in that namespace.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-32038 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →