CVE-2026-41294

HIGH

OpenClaw < 2026.3.28 - Environment Variable Injection via CWD .env File

Title source: cna
STIX 2.1

Description

OpenClaw before 2026.3.28 loads the current working directory .env file before trusted state-dir configuration, allowing environment variable injection. Attackers can place a malicious .env file in a repository or workspace to override runtime configuration and security-sensitive environment settings during OpenClaw startup.

Scores

CVSS v3 8.6
EPSS 0.0001
EPSS Percentile 2.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-15
Status published
Products (4)
npm/openclaw 0 - 2026.3.28npm
OpenClaw/OpenClaw < 2026.3.28
openclaw/openclaw < 2026.3.28
OpenClaw/OpenClaw 2026.3.28
Published Apr 21, 2026
Tracked Since Apr 21, 2026