CVE-2026-44992
MEDIUM
4,1
Source: [email protected]
Attack Vector: local
Attack Complexity: low
Privileges Required: low
User Interaction: passive
Confidentiality: N/A
Integrity: N/A
Availability: N/A
MEDIUM
5,0
Source: [email protected]
Attack Vector: local
Attack Complexity: low
Privileges Required: low
User Interaction: required
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none
Description
AI Translation Available
OpenClaw versions 2026.4.5 before 2026.4.20 contain an environment variable injection vulnerability allowing workspace dotenv to override MINIMAX_API_HOST. Attackers can redirect credentialed MiniMax API requests to attacker-controlled origins, exposing the MiniMax API key in Authorization headers.
441
Unintended Proxy or Intermediary ('Confused Deputy')
DraftCommon Consequences
Security Scopes Affected:
Non-Repudiation
Access Control
Potential Impacts:
Gain Privileges Or Assume Identity
Hide Activities
Execute Unauthorized Code Or Commands
Applicable Platforms
All platforms may be affected
https://github.com/openclaw/openclaw/commit/2f06696579a1ab0cb5bbbbb6a900414a6b2…
https://github.com/openclaw/openclaw/security/advisories/GHSA-h2vw-ph2c-jvwf
https://www.vulncheck.com/advisories/openclaw-minimax-api-host-override-via-wor…