Impact
OpenClaw uses workspace .env files to configure the OPENCLAW_BUNDLED_PLUGINS_DIR environment variable, which the application relies on to locate the trusted plugin directory. The vulnerability allows an attacker who controls these .env files to overwrite the variable, directing the software to a malicious directory. This bypasses the built‑in plugin trust verification and permits loading arbitrary plugins that can execute code within the workspace context, corresponding to CWE‑829.
Affected Systems
All releases of OpenClaw before version 2026.3.31 are affected. The product impacted is the OpenClaw application itself; any installation that processes workspace .env files without additional safeguards is susceptible.
Risk and Exploitability
The CVSS score of 8.5 signals a high‑severity flaw. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, so current exploitation likelihood is uncertain. Based on the description, the likely attack vector is local modification of workspace .env files by an attacker who has access to the workspace configuration. By setting or altering the OPENCLAW_BUNDLED_PLUGINS_DIR variable, the attacker can cause the application to load untrusted plugins and execute arbitrary code.
OpenCVE Enrichment