Environment Variable Injection in OpenClaw Product by OpenClaw
CVE-2026-43531

7HIGH

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
5 May 2026

What is CVE-2026-43531?

OpenClaw versions prior to 2026.4.9 are susceptible to an environment variable injection vulnerability. This security flaw allows attackers to manipulate runtime-control variables through malicious .env files placed in workspace directories. By crafting these files, an attacker could alter key application behaviors, such as update sources, gateway URLs, ClawHub resolution, and even executable paths for browsers, potentially leading to significant security breaches. It is crucial for users to upgrade to the latest version to mitigate these risks.

Affected Version(s)

OpenClaw 0 < 2026.4.9

OpenClaw 2026.4.9

References

CVSS V4

Score:
7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

zsx (@zsxsoft)
KeenSecurityLab
.