Remote Code Execution Vulnerability in OpenClaw by OpenClaw Team
CVE-2026-42427

5.8MEDIUM

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
28 April 2026

What is CVE-2026-42427?

The vulnerability in OpenClaw originates from insufficient entries in the environment variable denylist, particularly for HGRCPATH, CARGO_BUILD_RUSTC_WRAPPER, RUSTC_WRAPPER, and MAKEFLAGS. This oversight allows attackers to inject malicious environment variables during the build process, influencing host execution commands and potentially leading to arbitrary code execution on affected systems. Users are strongly advised to upgrade to version 2026.4.8 or later to mitigate these risks. For further details, see the GitHub Security Advisory and the VulnCheck Advisory.

Affected Version(s)

OpenClaw 0 < 2026.4.8

OpenClaw 2026.4.8

References

CVSS V4

Score:
5.8
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

boyhack (@boy-hack)
.