CVE-2026-43531

HIGH

OpenClaw < 2026.4.9 - Environment Variable Injection via Workspace .env File

Title source: cna
STIX 2.1

Description

OpenClaw before 2026.4.9 contains an environment variable injection vulnerability allowing malicious workspace .env files to set runtime-control variables. Attackers can inject variables affecting update sources, gateway URLs, ClawHub resolution, and browser executable paths to compromise application behavior.

References (3)

Core 3
Core References
Vendor Advisory vendor-advisory
GitHub Security Advisory (GHSA-7wv4-cc7p-jhxc)
https://github.com/openclaw/openclaw/security/advisories/GHSA-7wv4-cc7p-jhxc
Third Party Advisory third-party-advisory
VulnCheck Advisory: OpenClaw < 2026.4.9 - Environment Variable Injection via Workspace .env File
https://www.vulncheck.com/advisories/openclaw-environment-variable-injection-via-workspace-env-file

Scores

CVSS v3 7.3
EPSS 0.0001
EPSS Percentile 1.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-15
Status published
Products (3)
npm/openclaw 0 - 2026.4.9npm
OpenClaw/OpenClaw < 2026.4.9
OpenClaw/OpenClaw 2026.4.9
Published May 05, 2026
Tracked Since May 05, 2026