A Command Injection vulnerability existed in Clawdbot’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment variable when constructing shell commands.
An authenticated user able to control environment variables could influence command execution within the container context. This issue has been fixed and regression tests have been added to prevent reintroduction.
In environments where Docker sandbox mode was enabled, authenticated users capable of supplying environment variables could affect the behavior of commands executed inside the container.
This could lead to: 1. Execution of unintended commands inside the container 2. Access to the container filesystem and environment variables 3. Exposure of sensitive data 4. Increased risk in misconfigured or privileged container environments
{
"nvd_published_at": "2026-02-02T23:16:08Z",
"cwe_ids": [
"CWE-78"
],
"github_reviewed_at": "2026-02-02T23:39:47Z",
"severity": "HIGH",
"github_reviewed": true
}