CVE-2026-41369 PUBLISHED

OpenClaw < 2026.3.31 - Insufficient Environment Variable Sanitization in Host Execution

Assigner: VulnCheck
Reserved: 20.04.2026 Published: 27.04.2026 Updated: 27.04.2026

OpenClaw before 2026.3.31 contains insufficient environment variable sanitization in host exec operations, failing to filter package, registry, Docker, compiler, and TLS override variables. Attackers can exploit this by injecting malicious environment variables to override critical system configurations and compromise host execution integrity.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CVSS Score: 7.1

Product Status

Vendor OpenClaw
Product OpenClaw
Versions Default: unaffected
  • affected from 0 to 2026.3.31 (excl.)
  • Version 2026.3.31 is unaffected

Credits

  • tdjackey reporter

References

Problem Types

  • CWE-668: Exposure of Resource to Wrong Sphere CWE