Impact
A command injection flaw exists in OpenClaw’s Docker sandbox execution. The vulnerability arises from unsafe concatenation of the PATH environment variable into shell commands used inside the container. When an authenticated user can control environment variables, they may cause the container to run arbitrary shell commands. This flaw is a classic system‑level code execution vulnerability (CWE‑78).
Affected Systems
OpenClaw (formerly Clawdbot) prior to version 2026.1.29 is affected. The issue is present in all installations that use the vulnerable Docker execution mechanism before the released fix. The official vendor identifiers indicate the product is managed by clawdbot:clawdbot.
Risk and Exploitability
The CVSS score of 8.8 indicates high severity. The EPSS score of less than 1% shows a low probability of active exploitation, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires authenticated access that allows the attacker to inject environment variables and is likely limited to users with administrative privileges on the host. While the risk to unprivileged users is minimal, an attacker who gains this capability can gain full control of the container and potentially the host if the container runs with elevated privileges.
OpenCVE Enrichment
Github GHSA