Impact
OpenClaw version 2026.2.19‑2 contains a vulnerability in the function applySkillConfigenvOverrides of the Skill Env Handler component. According to the advisory, manipulating data processed by this function can lead to code injection, allowing an attacker to execute arbitrary code within the context of the OpenClaw process. The weakness is classified as CWE‑74 and CWE‑94, indicating that user input is not properly sanitized before being used in code execution paths. The vulnerability description explicitly states that the attack can be launched remotely, but no further details about the required conditions are provided.
Affected Systems
The affected product is OpenClaw, with deployments of version 2026.2.19‑2 identified as vulnerable. The public advisory recommends upgrading to version 2026.2.21‑beta.1, which incorporates the security fix (commit 8c9f35cdb51692b650ddf05b259ccdd75cc9a83c). Affected CPE strings include openclaw:openclaw and openclaw:openclaw:node.js. No other vendors or product versions are listed in the CVE data.
Risk and Exploitability
The CVSS base score is 5.3, indicating a moderate severity risk. The EPSS score is reported as less than 1%, implying that the likelihood of exploitation is low at present. The vulnerability is not present in the CISA Known Exploited Vulnerabilities catalog, meaning there are no documented active exploitations. An attacker would need to reach the target system over the network to trigger the remote code injection described in the advisory. These facts suggest that while the risk is moderate, practical exploitation remains uncommon based on available evidence.
OpenCVE Enrichment
Github GHSA