Description
OpenClaw before 2026.4.9 contains an environment variable injection vulnerability allowing malicious workspace .env files to set runtime-control variables. Attackers can inject variables affecting update sources, gateway URLs, ClawHub resolution, and browser executable paths to compromise application behavior.
Published: 2026-05-05
Score: 7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in OpenClaw before version 2026.4.9 permits attackers to place malicious .env files inside a workspace. When the application starts, it loads these files and applies the variables found there as runtime‑control settings. Because the injected values can influence critical configuration parameters—such as update sources, gateway URLs, ClawHub resolution paths, and the location of browser executables—the attacker can redirect traffic, install malware, or alter application behavior.

Affected Systems

All instances of OpenClaw OpenClaw released prior to 2026.4.9 are affected. No other vendors or products are listed as impacted.

Risk and Exploitability

The CVSS score of 7 points to moderate‑to‑high severity. EPSS information is not available, and the vulnerability is not included in the CISA KEV catalog. Attackers most likely need to be able to write or otherwise introduce a .env file into a workspace that the application will load, which implies either compromised credentials or local access to the environment where the workspace resides. Given the potential for configuration manipulation, the risk remains significant.

Generated by OpenCVE AI on May 5, 2026 at 13:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenClaw to version 2026.4.9 or later to remove the injection vulnerability.
  • Before loading any workspace .env files, validate or strip untrusted entries so that only trusted configuration values are honored.
  • Limit write permissions on workspace directories to trusted users so that malicious .env files cannot be added without authorization.

Generated by OpenCVE AI on May 5, 2026 at 13:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-7wv4-cc7p-jhxc OpenClaw: Workspace .env could inject OpenClaw runtime-control variables
History

Tue, 05 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 05 May 2026 11:45:00 +0000

Type Values Removed Values Added
Description OpenClaw before 2026.4.9 contains an environment variable injection vulnerability allowing malicious workspace .env files to set runtime-control variables. Attackers can inject variables affecting update sources, gateway URLs, ClawHub resolution, and browser executable paths to compromise application behavior.
Title OpenClaw < 2026.4.9 - Environment Variable Injection via Workspace .env File
First Time appeared Openclaw
Openclaw openclaw
Weaknesses CWE-15
CPEs cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
Vendors & Products Openclaw
Openclaw openclaw
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Openclaw
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-05T14:12:31.235Z

Reserved: 2026-05-01T16:56:19.947Z

Link: CVE-2026-43531

cve-icon Vulnrichment

Updated: 2026-05-05T13:49:29.664Z

cve-icon NVD

Status : Received

Published: 2026-05-05T12:16:19.337

Modified: 2026-05-05T12:16:19.337

Link: CVE-2026-43531

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T13:30:25Z

Weaknesses