PT-2026-26008 · Openclaw · Openclaw

Tdjackey

·

Published

2026-03-18

·

Updated

2026-03-18

·

CVE-2026-22177

CVSS v3.1
6.1
VectorAV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
OpenClaw versions prior to 2026.2.21 fail to filter dangerous process-control environment variables from config env.vars, allowing startup-time code execution. Attackers can inject variables like NODE OPTIONS or LD * through configuration to execute arbitrary code in the OpenClaw gateway service runtime context.

Fix

Weakness Enumeration

Related Identifiers

CVE-2026-22177

Affected Products

Openclaw