Description
OpenClaw versions from 2026.2.22 before 2026.4.12 contain an insufficient shell-wrapper detection vulnerability allowing attackers to inject environment variable assignments at the argv level. Attackers can bypass exec preflight handling to manipulate high-risk shell variables like SHELLOPTS and PS4, affecting execution semantics and security controls.
Published: 2026-05-05
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

OpenClaw versions between 2026.2.22 and before 2026.4.12 contain an insufficient shell‑wrapper detection mechanism that lets attackers inject environment variable assignments at the argv level. By doing so, an attacker can bypass the exec preflight checks and manipulate high‑risk shell variables such as SHELLOPTS and PS4, thereby altering the execution semantics of the command and potentially enabling arbitrary code execution.

Affected Systems

The vulnerable product is OpenClaw, specifically the OpenClaw software from the OpenClaw vendor. Affected releases are those dated 2026.2.22 up to, but not including, 2026.4.12. No other vendors or products are listed as affected.

Risk and Exploitability

The vulnerability scores a CVSS of 8.7, indicating a high severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the likely attack vector involves an attacker supplying crafted arguments to a vulnerable instance of OpenClaw. Once executed, manipulation of SHELLOPTS or PS4 can change shell behavior, potentially elevating privileges or executing unintended commands.

Generated by OpenCVE AI on May 5, 2026 at 12:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.4.12 or later, which removes the shell‑wrapper detection flaw.
  • Apply the vendor’s security patch if an upgrade is not immediately feasible, ensuring the tool no longer performs the weakened preflight check.
  • Monitor for any anomalous environment variable usage in running instances and consider restricting critical shell variables (e.g., SHELLOPTS, PS4) from being modified by untrusted inputs.

Generated by OpenCVE AI on May 5, 2026 at 12:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-j6c7-3h5x-99g9 OpenClaw: Shell-wrapper detection missed env-argv assignment injection forms
History

Tue, 05 May 2026 11:45:00 +0000

Type Values Removed Values Added
Description OpenClaw versions from 2026.2.22 before 2026.4.12 contain an insufficient shell-wrapper detection vulnerability allowing attackers to inject environment variable assignments at the argv level. Attackers can bypass exec preflight handling to manipulate high-risk shell variables like SHELLOPTS and PS4, affecting execution semantics and security controls.
Title OpenClaw 2026.2.22 < 2026.4.12 - Shell-Wrapper Detection Bypass via Environment Variable Assignment Injection
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-184
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-05T11:24:54.597Z

Reserved: 2026-04-27T11:40:07.152Z

Link: CVE-2026-42435

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-05T12:16:17.910

Modified: 2026-05-05T12:16:17.910

Link: CVE-2026-42435

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T13:00:07Z

Weaknesses