Impact
A flaw in OpenClaw before version 2026.4.9 permits attackers to place malicious .env files inside a workspace. When the application starts, it loads these files and applies the variables found there as runtime‑control settings. Because the injected values can influence critical configuration parameters—such as update sources, gateway URLs, ClawHub resolution paths, and the location of browser executables—the attacker can redirect traffic, install malware, or alter application behavior.
Affected Systems
All instances of OpenClaw OpenClaw released prior to 2026.4.9 are affected. No other vendors or products are listed as impacted.
Risk and Exploitability
The CVSS score of 7 points to moderate‑to‑high severity. EPSS information is not available, and the vulnerability is not included in the CISA KEV catalog. Attackers most likely need to be able to write or otherwise introduce a .env file into a workspace that the application will load, which implies either compromised credentials or local access to the environment where the workspace resides. Given the potential for configuration manipulation, the risk remains significant.
OpenCVE Enrichment
Github GHSA