OpenClaw allowed dangerous process-control environment variables from env.vars (for example NODE_OPTIONS, LD_*, DYLD_*) to flow into gateway service runtime environments, enabling startup-time code execution in the OpenClaw process context.
collectConfigEnvVars() accepted unfiltered keys from config and those values were merged into the daemon install environment in buildGatewayInstallPlan(). Before the fix, startup-control variables were not blocked in this path.
openclaw (npm)2026.2.19-2 (published February 19, 2026)<=2026.2.19-2 || =2026.2.19>= 2026.2.212cdbadee1f8fcaa93302d7debbfc529e19868ea4patched_versions is pre-set to the planned next release (2026.2.21). Once that npm release is published, this advisory is ready to publish without further content edits.
OpenClaw thanks @tdjackey for reporting.
{
"cwe_ids": [
"CWE-15"
],
"github_reviewed": true,
"nvd_published_at": "2026-03-18T02:16:21Z",
"severity": "HIGH",
"github_reviewed_at": "2026-03-03T19:53:02Z"
}