Insufficient Environment Variable Sanitization in OpenClaw by OpenClaw
CVE-2026-41369

7.1HIGH

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
27 April 2026

What is CVE-2026-41369?

OpenClaw before version 2026.3.31 suffers from insufficient sanitization of environment variables during host execution operations. This vulnerability allows attackers to inject malicious environment variables that can override critical system configurations related to package management, registries, Docker, compiler settings, and TLS overrides, ultimately compromising the integrity of host execution. Organizations utilizing OpenClaw should prioritize updating to the latest version to mitigate these risks.

Affected Version(s)

OpenClaw 0 < 2026.3.31

OpenClaw 2026.3.31

References

CVSS V4

Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

tdjackey
.