PT-2026-39684 · Openclaw · Openclaw
Garagon
·
Published
2026-05-11
·
Updated
2026-05-11
·
CVE-2026-44995
CVSS v3.1
7.3
High
| Vector | AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
OpenClaw versions prior to 2026.4.20
Description
Improper environment variable validation in the MCP stdio server configuration allows for arbitrary code execution. Malicious workspace configurations can pass dangerous startup variables, such as
NODE OPTIONS, LD PRELOAD, or BASH ENV, to spawned MCP server processes, enabling code injection when operators start sessions using those servers.Recommendations
Update to version 2026.4.20.
Fix
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Openclaw