openclaw (npm)< 2026.4.202026.4.20Workspace .env loading did not reserve the OPENCLAW_ runtime-control namespace broadly enough. A malicious workspace could set variables such as OPENCLAW_GIT_DIR before source-update or installer flows, potentially steering trusted OpenClaw runtime behavior.
This requires running OpenClaw from an attacker-controlled workspace. Severity is medium.
OpenClaw now reserves the workspace OPENCLAW_ environment namespace and rejects workspace dotenv entries for OpenClaw runtime-control variables.
Fix commit:
018494fa3ebb9145112e68b56fe1cb2e9f9a9ed6Fixed in OpenClaw 2026.4.20.
{
"github_reviewed_at": "2026-04-25T23:47:05Z",
"nvd_published_at": null,
"cwe_ids": [
"CWE-184"
],
"severity": "HIGH",
"github_reviewed": true
}