Back to list

OpenClaude Sandbox Bypass via Model-Controlled `dangerouslyDisableSandbox` Input — CVE-2026-42074

GitHub · GitHub · CVE-2026-42074

ID
CVE-2026-42074
Date
Activity
Source
GitHub
Vendor
GitHub
Threat
critical
CVSS
9.3

Summary

### Summary The `dangerouslyDisableSandbox` parameter is exposed as part of the BashTool input schema, meaning the LLM (an untrusted principal per the project's own threat model) can set it to `true` in any `tool_use` response. Combined with the default `allowUnsandboxedCommands: true` setting, a prompt-injected model can escape the sandbox for any arbitrary command, achieving full host-level code execution. ###…

Product

npm: openclaude

What to do

General, cautious steps (verify details in the official source):

  • Prioritize patching or mitigation immediately (treat as actively risky).
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories