Arbitrary Code Execution Vulnerability in OpenClaw MCP Stdio Server Configuration
CVE-2026-44995

5.4MEDIUM

Key Information:

Vendor

Openclaw

Status
Vendor
CVE Published:
11 May 2026

What is CVE-2026-44995?

OpenClaw before version 2026.4.20 contains a vulnerability in the MCP stdio server configuration that permits attackers to execute arbitrary code. This loophole arises from improper validation of environment variables, allowing malicious workspace configurations to inject hazardous startup variables such as NODE_OPTIONS, LD_PRELOAD, or BASH_ENV into the MCP server processes. Consequently, when operators initiate sessions using these compromised servers, they risk unauthorized code execution, potentially compromising system integrity.

Affected Version(s)

OpenClaw 0 < 2026.4.20

OpenClaw 2026.4.20

References

CVSS V4

Score:
5.4
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Gus (@garagon)
.