Impact
OpenClaw versions 2026.2.19-2 up to but not including 2026.2.21 contain a command injection flaw in the generation of systemd unit files. The flaw originates when attacker‑controlled environment variables are not validated for carriage return or line feed characters; newline injection can break out of Environment= lines and inject arbitrary systemd directives. When an attacker can influence the config.env.vars file and trigger a service install or restart, they can execute arbitrary systemd commands with the privileges of the OpenClaw gateway service user, potentially leading to unauthorized code execution and privilege escalation.
Affected Systems
The affected product is OpenClaw from the vendor openclaw:openclaw. Affected releases include versions 2026.2.19-2 through any build prior to 2026.2.21. The Common Platform Enumeration strings indicate the vulnerable package name (openclaw) and the affected version range.
Risk and Exploitability
The CVSS score of 6.9 indicates a medium severity vulnerability. The EPSS score is reported as less than 1%, suggesting a low exploitation probability at present. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector requires the ability to modify config.env.vars and trigger a service install or restart, implying a local or privileged attacker context. Once satisfied, the attacker can inject new systemd directives to execute arbitrary commands. No widely known public exploit has been documented; mitigation is strongly recommended.
OpenCVE Enrichment
Github GHSA