CVE-2026-41332
MEDIUMOpenClaw < 2026.3.28 - Code Execution via Missing Environment Variable Blocklist
Title source: cnaDescription
OpenClaw before 2026.3.28 contains an environment variable sanitization vulnerability where GIT_TEMPLATE_DIR and AWS_CONFIG_FILE are not blocked in the host-env blocklist. Attackers can exploit approved exec requests to redirect git or AWS CLI behavior through attacker-controlled configuration files to execute untrusted code or load malicious credentials.
Scores
CVSS v3
5.3
EPSS
0.0002
EPSS Percentile
4.3%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-184
Status
published
Products (3)
OpenClaw/OpenClaw
< 2026.3.28
openclaw/openclaw
< 2026.3.28
OpenClaw/OpenClaw
2026.3.28
Published
Apr 23, 2026
Tracked Since
Apr 24, 2026