CVE-2026-43531
HIGH
7,0
Source: [email protected]
Attack Vector: local
Attack Complexity: low
Privileges Required: low
User Interaction: passive
Confidentiality: N/A
Integrity: N/A
Availability: N/A
HIGH
7,3
Source: [email protected]
Attack Vector: local
Attack Complexity: low
Privileges Required: low
User Interaction: required
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
Description
AI Translation Available
OpenClaw before 2026.4.9 contains an environment variable injection vulnerability allowing malicious workspace .env files to set runtime-control variables. Attackers can inject variables affecting update sources, gateway URLs, ClawHub resolution, and browser executable paths to compromise application behavior.
15
External Control of System or Configuration Setting
IncompleteCommon Consequences
Security Scopes Affected:
Other
Potential Impacts:
Varies By Context
Applicable Platforms
Technologies:
ICS/OT, Not Technology-Specific
https://github.com/openclaw/openclaw/commit/dbfcef319618158fa40b31cdac386ea34c3…
https://github.com/openclaw/openclaw/security/advisories/GHSA-7wv4-cc7p-jhxc
https://www.vulncheck.com/advisories/openclaw-environment-variable-injection-vi…