Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8fmp-37rc-p5g7 | OpenClaw's config env vars allowed startup env injection into service runtime |
Wed, 08 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 18 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.2.21 fail to filter dangerous process-control environment variables from config env.vars, allowing startup-time code execution. Attackers can inject variables like NODE_OPTIONS or LD_* through configuration to execute arbitrary code in the OpenClaw gateway service runtime context. | |
| Title | OpenClaw < 2026.2.21 - Environment Variable Injection via Config env.vars | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-15 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-08T16:05:27.893Z
Reserved: 2026-01-06T16:47:17.181Z
Link: CVE-2026-22177
Updated: 2026-03-18T19:48:35.532Z
Status : Modified
Published: 2026-03-18T02:16:21.957
Modified: 2026-04-08T17:21:14.597
Link: CVE-2026-22177
No data.
OpenCVE Enrichment
Updated: 2026-03-24T10:53:41Z
Github GHSA