Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-j7p2-qcwm-94v4 | OpenClaw's incomplete host env sanitization blocklist allows supply-chain redirection via package-manager env overrides |
Thu, 30 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.3.22 contains an incomplete host environment variable sanitization vulnerability in host-env-security-policy.json and host-env-security.ts that allows package-manager environment overrides. Attackers can exploit approved exec requests to redirect package resolution or runtime bootstrap to attacker-controlled infrastructure and execute trojanized content. | |
| Title | OpenClaw < 2026.3.22 - Supply Chain Redirection via Incomplete Host Environment Sanitization | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-183 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-30T12:50:50.254Z
Reserved: 2026-04-20T14:12:09.519Z
Link: CVE-2026-41387
Updated: 2026-04-30T12:50:45.628Z
Status : Analyzed
Published: 2026-04-28T19:37:41.910
Modified: 2026-04-30T20:36:10.410
Link: CVE-2026-41387
No data.
OpenCVE Enrichment
Updated: 2026-04-28T23:15:43Z
Github GHSA