OpenClaw loaded the current working directory .env before trusted state-dir configuration, allowing untrusted workspace state to inject host environment values.
A repository or workspace containing a malicious .env file could override runtime configuration and security-sensitive environment settings when OpenClaw started there.
src/infra/dotenv.ts, src/cli/dotenv.ts
<= 2026.3.24>= 2026.3.282026.3.28 contains the fix.Fixed by commit 6a79324802 (Filter untrusted CWD .env entries before OpenClaw startup).
{
"github_reviewed": true,
"github_reviewed_at": "2026-04-01T00:02:42Z",
"severity": "CRITICAL",
"nvd_published_at": null,
"cwe_ids": [
"CWE-426"
]
}