OpenClaw before 2026.4.20 contains an improper environment variable validation vulnerability in MCP stdio server configuration that allows attackers to execute arbitrary code. Malicious workspace configurations can pass dangerous startup variables like NODE_OPTIONS, LD_PRELOAD, or BASH_ENV to spawned MCP server processes, enabling code injection when operators start sessions using those servers.
Metrics
Affected Vendors & Products
References
History
Mon, 11 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.4.20 contains an improper environment variable validation vulnerability in MCP stdio server configuration that allows attackers to execute arbitrary code. Malicious workspace configurations can pass dangerous startup variables like NODE_OPTIONS, LD_PRELOAD, or BASH_ENV to spawned MCP server processes, enabling code injection when operators start sessions using those servers. | |
| Title | OpenClaw < 2026.4.20 - Arbitrary Code Execution via MCP stdio Environment Variables | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-829 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-11T17:57:02.478Z
Reserved: 2026-05-08T16:41:39.934Z
Link: CVE-2026-44995
Updated: 2026-05-11T17:56:49.317Z
Status : Received
Published: 2026-05-11T18:16:39.387
Modified: 2026-05-11T18:16:39.387
Link: CVE-2026-44995
No data.
OpenCVE Enrichment
Updated: 2026-05-11T18:45:25Z