Environment Variable Leakage in OpenClaw SSH Sandboxed Backends
CVE-2026-41357

2LOW

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
23 April 2026

What is CVE-2026-41357?

OpenClaw versions prior to 2026.3.31 exhibit a vulnerability associated with the leakage of environment variables through SSH-based sandbox backends. This issue arises when unsanitized process.environment variables are passed to child processes, potentially allowing attackers to exploit non-default SSH environment forwarding configurations. Through this misconfiguration, sensitive details from parent processes can be leaked into SSH child processes, posing a significant risk to the confidentiality of the environment.

Affected Version(s)

OpenClaw 0 < 2026.3.31

OpenClaw 2026.3.31

References

CVSS V4

Score:
2
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

AntAISecurityLab
.