Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vfp4-8x56-j7c5 | OpenClaw: Exec environment denylist missed high-risk interpreter startup variables |
Thu, 07 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 06 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.4.10 contains an insufficient environment variable denylist vulnerability in its exec environment policy that allows operator-supplied overrides of high-risk interpreter startup variables including VIMINIT, EXINIT, LUA_INIT, and HOSTALIASES. Attackers can exploit this by manipulating these environment variables to influence downstream execution behavior or network connectivity. | |
| Title | OpenClaw < 2026.4.10 - Insufficient Environment Variable Denylist in Exec Policy | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-184 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-07T14:59:24.866Z
Reserved: 2026-05-01T17:00:54.537Z
Link: CVE-2026-43584
Updated: 2026-05-07T13:02:24.013Z
Status : Analyzed
Published: 2026-05-06T20:16:34.333
Modified: 2026-05-07T19:36:47.607
Link: CVE-2026-43584
No data.
OpenCVE Enrichment
Updated: 2026-05-06T23:15:17Z
Github GHSA