Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. openclaw
  4. ›
  5. GHSA-w7j5-j98m-w679

GHSA-w7j5-j98m-w679: OpenClaw has multiple E2E/test Dockerfiles that run all processes as root

March 3, 2026

Three Dockerfiles in scripts/docker/ and scripts/e2e/ lack a USER directive, meaning all processes run as uid 0 (root). If any process is compromised, the attacker has root inside the container, making container breakout significantly easier. Partial fix (2026-02-08): Commit 28e1a65e added USER sandbox to Dockerfile.sandbox and Dockerfile.sandbox-browser. The E2E/test Dockerfiles listed below remain unpatched.

Affected components:

  • scripts/e2e/Dockerfile
  • scripts/e2e/Dockerfile.qr-import
  • scripts/docker/install-sh-e2e/Dockerfile
  • scripts/docker/install-sh-nonroot/Dockerfile (runs as app but with NOPASSWD sudo — see related advisory)

Technical Reproduction:

  1. Open each Dockerfile listed above and search for a USER directive — none found.
  2. Run any of these containers: docker run –rm -it id
  3. Observe: returns uid=0(root).

Demonstrated Impact:

  • Root inside the container enables kernel exploit attempts, volume mount abuse, and privileged syscall access.
  • Test images share the same base (node:22-bookworm) as production, creating risk of accidental deployment of root-running images.

Environment: Base images node:22-bookworm and node:22-bookworm-slim default to root. Dockerfile.sandbox and Dockerfile.sandbox-browser were remediated in commit 28e1a65e; only the E2E/test images listed above remain affected.

Remediation: Add a USER directive before CMD/ENTRYPOINT in each remaining Dockerfile: RUN useradd –create-home –shell /bin/bash appuser USER appuser

References

  • github.com/advisories/GHSA-w7j5-j98m-w679
  • github.com/openclaw/openclaw
  • github.com/openclaw/openclaw/commit/28e1a65ebc580f07533966f5693f4df0a18d7085
  • github.com/openclaw/openclaw/security/advisories/GHSA-w7j5-j98m-w679

Code Behaviors & Features

Detect and mitigate GHSA-w7j5-j98m-w679 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2026.2.21

Fixed versions

  • 2026.2.21

Solution

Upgrade to version 2026.2.21 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-250: Execution with Unnecessary Privileges

Source file

npm/openclaw/GHSA-w7j5-j98m-w679.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:17:43 +0000.