Description
OpenClaw before 2026.4.8 fails to remove git plumbing environment variables from the execution environment before host exec operations. Attackers can exploit this by setting GIT_DIR and related variables to redirect git operations and compromise repository integrity.
Problem types
CWE-184: Incomplete List of Disallowed Inputs
Product status
Any version before 2026.4.8
2026.4.8 (semver)
Credits
boyhack (@boy-hack)
References
github.com/...enclaw/security/advisories/GHSA-cm8v-2vh9-cxf3 (GitHub Security Advisory (GHSA-cm8v-2vh9-cxf3))
github.com/...ommit/d7c3210cd6f5fdfdc1beff4c9541673e814354d5 (Patch Commit)
www.vulncheck.com/...jection-via-unfiltered-exec-environment (VulnCheck Advisory: OpenClaw < 2026.4.8 - Git Environment Variable Injection via Unfiltered Exec Environment)