Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. openclaw
  4. ›
  5. GHSA-fh3f-q9qw-93j9

GHSA-fh3f-q9qw-93j9: OpenClaw replaced a deprecated sandbox hash algorithm

February 19, 2026

The sandbox identifier cache key for Docker/browser sandbox configuration used SHA-1 to hash normalized configuration payloads.

SHA-1 is deprecated for cryptographic use and has known collision weaknesses. In this code path, deterministic IDs are used to decide whether an existing sandbox container can be reused safely. A collision in this hash could let one configuration be interpreted as another under the same sandbox cache identity, increasing the risk of cache poisoning and unsafe sandbox state reuse.

The implementation now uses SHA-256 for these deterministic hashes to restore collision resistance for this security-relevant identifier path.

References

  • github.com/advisories/GHSA-fh3f-q9qw-93j9
  • github.com/openclaw/openclaw
  • github.com/openclaw/openclaw/commit/559c8d9930eebb5356506ff1a8cd3dbaec92be77
  • github.com/openclaw/openclaw/releases/tag/v2026.2.15
  • github.com/openclaw/openclaw/security/advisories/GHSA-fh3f-q9qw-93j9

Code Behaviors & Features

Detect and mitigate GHSA-fh3f-q9qw-93j9 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2026.2.15

Fixed versions

  • 2026.2.15

Solution

Upgrade to version 2026.2.15 or above.

Impact 5.4 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-328: Use of Weak Hash

Source file

npm/openclaw/GHSA-fh3f-q9qw-93j9.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:17:28 +0000.