CVE-2026-22177
MEDIUMOpenClaw < 2026.2.21 - Environment Variable Injection via Config env.vars
Title source: cnaDescription
OpenClaw versions prior to 2026.2.21 fail to filter dangerous process-control environment variables from config env.vars, allowing startup-time code execution. Attackers can inject variables like NODE_OPTIONS or LD_* through configuration to execute arbitrary code in the OpenClaw gateway service runtime context.
References (4)
Core 4
Core References
Third Party Advisory vendor-advisory
GitHub Security Advisory (GHSA-8fmp-37rc-p5g7)
https://github.com/openclaw/openclaw/security/advisories/GHSA-8fmp-37rc-p5g7
Patch patch
Patch Commit
https://github.com/openclaw/openclaw/commit/2cdbadee1f8fcaa93302d7debbfc529e19868ea4
Third Party Advisory third-party-advisory
VulnCheck Advisory: OpenClaw < 2026.2.21 - Environment Variable Injection via Config env.vars
https://www.vulncheck.com/advisories/openclaw-environment-variable-injection-via-config-env-vars
Vendor Advisory vendor-advisory
Patch Commit
https://github.com/openclaw/openclaw/security/advisories/GHSA-w9j9-w4cp-6wgr
Scores
CVSS v3
6.1
EPSS
0.0002
EPSS Percentile
6.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-15
Status
published
Products (4)
npm/openclaw
0 - 2026.2.21npm
OpenClaw/OpenClaw
< 2026.2.21
openclaw/openclaw
< 2026.2.21
OpenClaw/OpenClaw
2026.2.21
Published
Mar 18, 2026
Tracked Since
Mar 18, 2026