Impact
OpenClaw versions before 2026.3.31 allow an attacker to override environment variables specified in the host execution policy. The override bypasses critical security controls including proxy settings, TLS verification, Docker restrictions, and Git TLS enforcement, potentially enabling the execution of malicious code or compromise of secure connections. This weakness is identified as CWE-453, reflecting improper restriction of operations within a confined environment.
Affected Systems
The vulnerability affects the OpenClaw product from the OpenClaw vendor. Systems running any version prior to 2026.3.31 are impacted; versions 2026.3.31 and later are not affected.
Risk and Exploitability
The CVSS score is 2, indicating low severity, and no EPSS score is provided. The vulnerability is not listed in CISA KEV. Attack vectors appear to be tied to the ability to influence environment variables during host execution; the exact conditions are not detailed in the advisory, but the likely attack path involves an attacker having privileges to set environment variables that are consumed by host‑side execution processes. As this is a low‑severity issue with no known exploitation probability data, the risk remains relatively low but the impact of bypassing controls could be significant if an attacker can influence execution contexts.
OpenCVE Enrichment
Github GHSA