Description
OpenClaw before 2026.3.31 contains an environment variable leakage vulnerability in SSH-based sandbox backends that pass unsanitized process.env to child processes. Attackers can exploit this by leveraging non-default SSH environment forwarding configurations to leak sensitive environment variables from parent processes to SSH child processes.
Published: 2026-04-23
Score: 2 Low
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure via Environment Variable Leakage
Action: Patch
AI Analysis

Impact

OpenClaw before 2026.3.31 passes unsanitized process.env to child processes used by SSH sandbox backends. This flaw allows an attacker to read environment variables that belong to the parent process, potentially exposing passwords, API keys, or other sensitive data. The weakness is a straight information leak described as CWE-214. In practice, the attacker can gather sensitive data that could lead to credential compromise or facilitate further privileged actions, but the vulnerability does not grant code execution or direct modification of the target system.

Affected Systems

The affected product is OpenClaw 2026.3 and all earlier releases. The vulnerability specifically impacts any deployment that uses OpenClaw’s SSH sandbox backends, which are configured to forward the current environment to the child process. No specific version range is listed beyond the stated cutoff, so all versions older than 2026.3.31 are considered susceptible.

Risk and Exploitability

The CVSS score of 2 indicates a low severity classification, and the EPSS score of less than 1% suggests a very low probability of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is an attacker with the ability to manipulate or observe the SSH environment forwarding configuration in the SSH sandbox backend; based on the description, it is inferred that the attacker would need to inject or modify the environment variables that are forwarded. Exploitability requires that the target system accepts arbitrary environment data for SSH child processes, which may be configurable by system administrators or developers. Because the flaw is limited to leaking existing environment data rather than generating new data, it places the attacker’s capabilities mainly in disclosure rather than full control.

Generated by OpenCVE AI on April 28, 2026 at 14:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official OpenClaw 2026.3.31 release or later, which sanitizes environment variables before passing them to child processes
  • If the upgrade cannot be performed immediately, configure the SSH sandbox backend to disable environment forwarding or to filter the environment to a safe subset
  • Verify that no custom scripts or wrappers are unintentionally re‑introducing process.env to child processes

Generated by OpenCVE AI on April 28, 2026 at 14:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 24 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 22:15:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.31 contains an environment variable leakage vulnerability in SSH-based sandbox backends that pass unsanitized process.env to child processes. Attackers can exploit this by leveraging non-default SSH environment forwarding configurations to leak sensitive environment variables from parent processes to SSH child processes.
Title OpenClaw < 2026.3.31 - Unsanitized Environment Variable Leakage in SSH Sandbox Backends
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-214
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

cvssV4_0

{'score': 2, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-24T13:16:32.772Z

Reserved: 2026-04-20T14:07:26.649Z

Link: CVE-2026-41357

cve-icon Vulnrichment

Updated: 2026-04-24T13:16:29.400Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-23T22:16:43.177

Modified: 2026-04-29T13:57:52.603

Link: CVE-2026-41357

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T14:45:16Z

Weaknesses