Skip to content
CVSS 7.8 · HIGH

CVE-2026-41384

OpenClaw before 2026.3.24 contains an environment variable injection vulnerability in the CLI backend runner that allows attackers to inject malicious environment variables through workspace configuration. Attackers can craft malicious workspace configs to inject arbitrary environment variables into the backend process spawning, enabling code execution or sensitive data exposure.

View on NVD

Analysis

OpenClaw is a niche open-source project with very limited adoption in professional web, mobile, or backend development. The vulnerability involves RCE through malicious configuration files, which is a significant bug but lacks the reach to justify a community-wide alert.

Severity

Score: 7.8(HIGH)
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AV: LOCAL
AC: LOW
PR: NONE
UI: REQUIRED
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-15

EPSS

Probability of exploitation (next 30 days): 0.0001 (0.0%)
Percentile: 2.8%
EPSS: 2026-05-06

Affects

openclaw:openclaw

Technical description

OpenClaw before 2026.3.24 contains an environment variable injection vulnerability in the CLI backend runner that allows attackers to inject malicious environment variables through workspace configuration. Attackers can craft malicious workspace configs to inject arbitrary environment variables into the backend process spawning, enabling code execution or sensitive data exposure.

Published: 4/28/2026, 7:37:41 PM
Last modified: 5/1/2026, 3:52:11 PM

References

HomeEventsBlogResourcesTeam