CVE-2026-43531
HIGHOpenClaw < 2026.4.9 - Environment Variable Injection via Workspace .env File
Title source: cnaDescription
OpenClaw before 2026.4.9 contains an environment variable injection vulnerability allowing malicious workspace .env files to set runtime-control variables. Attackers can inject variables affecting update sources, gateway URLs, ClawHub resolution, and browser executable paths to compromise application behavior.
References (3)
Core 3
Core References
Vendor Advisory vendor-advisory
GitHub Security Advisory (GHSA-7wv4-cc7p-jhxc)
https://github.com/openclaw/openclaw/security/advisories/GHSA-7wv4-cc7p-jhxc
Patch patch
Patch Commit
https://github.com/openclaw/openclaw/commit/dbfcef319618158fa40b31cdac386ea34c392c0c
Third Party Advisory third-party-advisory
VulnCheck Advisory: OpenClaw < 2026.4.9 - Environment Variable Injection via Workspace .env File
https://www.vulncheck.com/advisories/openclaw-environment-variable-injection-via-workspace-env-file
Scores
CVSS v3
7.3
EPSS
0.0001
EPSS Percentile
1.7%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-15
Status
published
Products (3)
npm/openclaw
0 - 2026.4.9npm
OpenClaw/OpenClaw
< 2026.4.9
OpenClaw/OpenClaw
2026.4.9
Published
May 05, 2026
Tracked Since
May 05, 2026