Impact
OpenClaw versions between 2026.2.22 and before 2026.4.12 contain an insufficient shell‑wrapper detection mechanism that lets attackers inject environment variable assignments at the argv level. By doing so, an attacker can bypass the exec preflight checks and manipulate high‑risk shell variables such as SHELLOPTS and PS4, thereby altering the execution semantics of the command and potentially enabling arbitrary code execution.
Affected Systems
The vulnerable product is OpenClaw, specifically the OpenClaw software from the OpenClaw vendor. Affected releases are those dated 2026.2.22 up to, but not including, 2026.4.12. No other vendors or products are listed as affected.
Risk and Exploitability
The vulnerability scores a CVSS of 8.7, indicating a high severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the likely attack vector involves an attacker supplying crafted arguments to a vulnerable instance of OpenClaw. Once executed, manipulation of SHELLOPTS or PS4 can change shell behavior, potentially elevating privileges or executing unintended commands.
OpenCVE Enrichment
Github GHSA