Sandboxed agents could escape exec routing via host=node override.
openclaw>= 2026.4.5 < 2026.4.10>= 2026.4.10A sandboxed agent could request host: "node" and route exec to a remote node instead of the intended sandbox execution path, bypassing the sandbox routing boundary.
The fix blocks sandboxed exec escape to remote node targets and keeps routing aligned with the active sandbox policy.
The issue was fixed in #63880. The first stable tag containing the fix is v2026.4.10, and openclaw@2026.4.14 includes the fix.
dffad08529202edbf34e4808788e1182fe10f6a9Users should upgrade to openclaw 2026.4.10 or newer. The latest npm release, 2026.4.14, already includes the fix.
Thanks to @zsxsoft, with sponsorship from @KeenSecurityLab and @qclawer for reporting this issue.
2026.4.10Exploitability
AV:NAC:LAT:NPR:LUI:NVulnerable System
VC:NVI:HVA:NSubsequent System
SC:NSI:HSA:N8.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N