Impact
OpenClaw processes workspace dotenv files without reserving the OPENCLAW_ prefix, allowing an attacker who can supply a workspace with a dotenv file to override critical runtime environment variables. Variables such as OPENCLAW_GIT_DIR may be set to arbitrary values, enabling the trusted OpenClaw instance to perform untrusted actions during source‑update or installer flows. This privilege escalation can lead to code execution or other unauthorized operations.
Affected Systems
The vulnerability affects the OpenClaw product from the vendor OpenClaw. All releases prior to 2026.4.20 are susceptible. It is present whenever workspace dotenv files are interpreted by the runtime.
Risk and Exploitability
The CVSS score of 8.5 indicates a high severity. No EPSS data is available, so the exploitation probability cannot be quantified, but the issue has been documented by security teams and listed in advisory references. Because the attacker only needs to place a malicious workspace file on a system that runs OpenClaw, the attack vector is local or remote depending on how workspaces are provided. The vulnerability is not listed in the CISA KEV catalog, yet the potential for runtime tampering is significant, underscoring the importance of applying the patch promptly.
OpenCVE Enrichment