system.run environment sanitization allowed shell-startup env overrides (HOME, ZDOTDIR) that can execute attacker-controlled startup files before allowlist-evaluated command bodies.
openclaw (npm)<= 2026.2.21-2 (latest published vulnerable version)>= 2026.2.22In affected versions:
- Env sanitization blocked many dangerous keys, but not startup-sensitive override keys (HOME, ZDOTDIR) in host exec env paths.
- Shell-wrapper analysis for allowlist mode models command bodies, but not shell startup side effects.
- Runtime execution used sanitized env, so attacker-provided startup-key overrides could run hidden startup payloads first.
Observed exploit vectors:
- HOME + bash -lc + malicious .bash_profile
- ZDOTDIR + zsh -c + malicious .zshenv
c2c7114ed39a547ab6276e1e933029b9530ee906patched_versions is pre-set to the planned next release (>= 2026.2.22). After the npm release is published, this advisory can be published directly.
OpenClaw thanks @tdjackey for reporting.
{
"github_reviewed_at": "2026-03-03T22:12:51Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-15",
"CWE-78"
],
"nvd_published_at": null,
"severity": "HIGH"
}