Description
OpenClaw before 2026.3.31 contains an environment variable leakage vulnerability in SSH-based sandbox backends that pass unsanitized process.env to child processes. Attackers can exploit this by leveraging non-default SSH environment forwarding configurations to leak sensitive environment variables from parent processes to SSH child processes.
Problem types
CWE-214 Invocation of Process Using Visible Sensitive Information
Product status
Any version before 2026.3.31
2026.3.31 (semver)
Credits
AntAISecurityLab
References
github.com/...enclaw/security/advisories/GHSA-j9pv-rrcj-6pfx (GitHub Security Advisory (GHSA-j9pv-rrcj-6pfx))
github.com/...ommit/cfe14459531e002a1c61c27d97ec7dc8aecddc1f (Patch Commit)
www.vulncheck.com/...ariable-leakage-in-ssh-sandbox-backends (VulnCheck Advisory: OpenClaw < 2026.3.31 - Unsanitized Environment Variable Leakage in SSH Sandbox Backends)