Description
OpenClaw before 2026.3.31 contains insufficient environment variable sanitization in host exec operations, failing to filter package, registry, Docker, compiler, and TLS override variables. Attackers can exploit this by injecting malicious environment variables to override critical system configurations and compromise host execution integrity.
Problem types
CWE-668: Exposure of Resource to Wrong Sphere
Product status
Any version before 2026.3.31
2026.3.31 (semver)
Credits
tdjackey
References
github.com/...enclaw/security/advisories/GHSA-cg7q-fg22-4g98 (GitHub Security Advisory (GHSA-cg7q-fg22-4g98))
github.com/...ommit/eb8de6715f02949c21c4e895fffc8a6dcb00975c (Patch Commit)
www.vulncheck.com/...variable-sanitization-in-host-execution (VulnCheck Advisory: OpenClaw < 2026.3.31 - Insufficient Environment Variable Sanitization in Host Execution)