Impact
OpenClaw before 2026.3.28 contains an environment variable sanitization vulnerability where GIT_TEMPLATE_DIR and AWS_CONFIG_FILE are not blocked in the host‑env blocklist. Attackers can exploit approved exec requests to redirect git or AWS CLI behavior through attacker‑controlled configuration files to execute untrusted code or load malicious credentials. This flaw allows an attacker to run arbitrary code with the privileges of the OpenClaw process and can also expose sensitive AWS credentials if the configuration files are malicious.
Affected Systems
The vulnerability affects all OpenClaw installations running a version earlier than 2026.3.28. Any deployment using the default host‑env blocklist configuration without these variables blocked is susceptible.
Risk and Exploitability
The CVSS score of 5.8 indicates a moderate severity, and the EPSS score of less than 1 % suggests a low probability of exploitation in the wild. It is not listed in the CISA KEV catalog. Exploitation likely requires an attacker who can trigger approved exec requests within the OpenClaw environment, such as an authenticated user or a process with elevated privileges. If successful, the attacker can gain remote code execution capabilities and potentially compromise stored AWS credentials.
OpenCVE Enrichment
Github GHSA