Home

Description

OpenClaw before 2026.3.31 contains insufficient environment variable sanitization in host exec operations, failing to filter package, registry, Docker, compiler, and TLS override variables. Attackers can exploit this by injecting malicious environment variables to override critical system configurations and compromise host execution integrity.

PUBLISHED Reserved 2026-04-20 | Published 2026-04-27 | Updated 2026-04-28 | Assigner VulnCheck




HIGH: 7.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-668: Exposure of Resource to Wrong Sphere

Product status

Default status
unaffected

Any version before 2026.3.31
affected

2026.3.31 (semver)
unaffected

Credits

tdjackey reporter

References

github.com/...enclaw/security/advisories/GHSA-cg7q-fg22-4g98 (GitHub Security Advisory (GHSA-cg7q-fg22-4g98)) vendor-advisory

github.com/...ommit/eb8de6715f02949c21c4e895fffc8a6dcb00975c (Patch Commit) patch

www.vulncheck.com/...variable-sanitization-in-host-execution (VulnCheck Advisory: OpenClaw < 2026.3.31 - Insufficient Environment Variable Sanitization in Host Execution) third-party-advisory

cve.org (CVE-2026-41369)

nvd.nist.gov (CVE-2026-41369)

Download JSON