Arbitrary Code Execution in OpenClaw by Environment Variable Manipulation
CVE-2026-41336

8.5HIGH

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
23 April 2026

What is CVE-2026-41336?

The vulnerability in OpenClaw versions prior to 2026.3.31 allows malicious users to manipulate workspace .env files, overriding the OPENCLAW_BUNDLED_HOOKS_DIR environment variable. This can lead to the execution of arbitrary code by loading untrusted hook code, thereby replacing the secure default hooks with those controlled by an attacker. This poses a significant security risk, compromising the integrity of the system.

Affected Version(s)

OpenClaw 0 < 2026.3.31

OpenClaw 2026.3.31

References

CVSS V4

Score:
8.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Nathan (@nexrin)
KeenSecurityLab
.