Impact
OpenClaw before 2026.4.8 fails to remove git plumbing environment variables from the execution environment prior to host exec operations. Attackers can set GIT_DIR and related variables to redirect git operations, allowing malicious manipulation of repository contents and compromising repository integrity. This flaw represents a CWE-184 weakness, where the application fails to sanitize environment variables before using them in a security‑critical context.
Affected Systems
OpenClaw software (Node.js implementation) versions earlier than 2026.4.8 on all platforms supported by the OpenClaw project.
Risk and Exploitability
The CVSS score of 5.8 indicates a moderate risk, and no EPSS score is available, so exploitation likelihood is unknown. The vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be local, as an attacker needs the ability to set environment variables before OpenClaw executes git plumbing commands, but if the environment can be influenced remotely the risk increases. Exploitation requires only setting of GIT_DIR and related variables; no additional privileges are necessary beyond the ability to execute OpenClaw.
OpenCVE Enrichment