Description
OpenClaw before 2026.3.31 contains an incomplete host-env-security-policy.json that fails to restrict compiler binary environment variables, allowing untrusted models to substitute CC, CXX, CARGO_BUILD_RUSTC, and CMAKE_C_COMPILER via environment overrides. Attackers with approved host-exec requests can override compiler binaries to execute arbitrary code during build processes.
Published: 2026-04-28
Score: 5.8 Medium
EPSS: n/a
KEV: No
Impact: Execution of arbitrary code during host builds via compiler binary override
Action: Apply patch
AI Analysis

Impact

Versions of OpenClaw prior to 2026.3.31 fail to enforce restrictions on compiler binary environment variables defined in the host‑execution security policy. The incomplete policy allows untrusted models to set or override CC, CXX, CARGO_BUILD_RUSTC, and CMAKE_C_COMPILER, resulting in arbitrary compiler binary substitution. This issue maps to CWE‑427, which enables an attacker to replace legitimate system binaries with malicious executables, thereby achieving code execution during build processes. The vulnerability specifically grants attackers who have obtained approved host‑execution permissions the ability to execute arbitrary code as part of the model build workflow. The impact therefore includes confidentiality compromise, integrity violation of build artifacts, and potential persistence on the host through malicious binaries.

Affected Systems

The affected vendor is OpenClaw, product OpenClaw, versions older than 2026.3.31. No additional product details are available beyond this version range.

Risk and Exploitability

The CVSS score of 5.8 indicates a moderate severity. The EPSS score is not available, so current exploitation likelihood is unknown. OpenClaw is not listed in CISA KEV, implying no confirmed exploit in the wild as of this assessment. The attack requires an attacker to already have host‑execution approval; once that precondition is satisfied, they can override compiler binaries and execute arbitrary code during the build. The *likely attack vector* is an authorized model build for which the host‑policy permissions are established, making remediation critical for any environment that processes untrusted or partially trusted models.

Generated by OpenCVE AI on April 28, 2026 at 23:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.3.31 or later, where host‑env-security-policy.json properly restricts compiler binary environment variables
  • If an upgrade is delayed, immediately remove or lock the environment variables CC, CXX, CARGO_BUILD_RUSTC, and CMAKE_C_COMPILER from the host environment used for model builds; enforce checks that these variables are not set by untrusted models
  • Revise host‑execution approval processes to exclude untrusted or partially trusted models until the policy restriction is in place

Generated by OpenCVE AI on April 28, 2026 at 23:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.3.31 contains an incomplete host-env-security-policy.json that fails to restrict compiler binary environment variables, allowing untrusted models to substitute CC, CXX, CARGO_BUILD_RUSTC, and CMAKE_C_COMPILER via environment overrides. Attackers with approved host-exec requests can override compiler binaries to execute arbitrary code during build processes.
Title OpenClaw < 2026.3.31 - Compiler Binary Substitution via Environment Variable Override in Host Execution Policy
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-427
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N'}

cvssV4_0

{'score': 5.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-28T18:09:36.986Z

Reserved: 2026-04-20T14:10:32.653Z

Link: CVE-2026-41373

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-28T19:37:39.993

Modified: 2026-04-28T20:10:23.367

Link: CVE-2026-41373

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T23:15:43Z

Weaknesses