CVE-2026-22177

MEDIUM

OpenClaw < 2026.2.21 - Environment Variable Injection via Config env.vars

Title source: cna
STIX 2.1

Description

OpenClaw versions prior to 2026.2.21 fail to filter dangerous process-control environment variables from config env.vars, allowing startup-time code execution. Attackers can inject variables like NODE_OPTIONS or LD_* through configuration to execute arbitrary code in the OpenClaw gateway service runtime context.

References (4)

Core 4
Core References
Third Party Advisory vendor-advisory
GitHub Security Advisory (GHSA-8fmp-37rc-p5g7)
https://github.com/openclaw/openclaw/security/advisories/GHSA-8fmp-37rc-p5g7
Third Party Advisory third-party-advisory
VulnCheck Advisory: OpenClaw < 2026.2.21 - Environment Variable Injection via Config env.vars
https://www.vulncheck.com/advisories/openclaw-environment-variable-injection-via-config-env-vars

Scores

CVSS v3 6.1
EPSS 0.0002
EPSS Percentile 6.1%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-15
Status published
Products (4)
npm/openclaw 0 - 2026.2.21npm
OpenClaw/OpenClaw < 2026.2.21
openclaw/openclaw < 2026.2.21
OpenClaw/OpenClaw 2026.2.21
Published Mar 18, 2026
Tracked Since Mar 18, 2026