Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-82g8-464f-2mv7

Опубликовано: 27 фев. 2026
Источник: github
Github: Прошло ревью
CVSS4: 5.1

Описание

OpenClaw: Skill env override host env injection via applySkillConfigEnvOverrides (defense-in-depth)

Summary

applySkillConfigEnvOverrides previously copied skills.entries.*.env values into the host process.env without applying the host env safety policy.

Impact

In affected versions, dangerous process-level variables such as NODE_OPTIONS could be injected when unset, which can influence runtime/child-process behavior.

Required attacker capability

An attacker must be able to modify OpenClaw local state/config (for example ~/.openclaw/openclaw.json) to set skills.entries.<skill>.env or related skill config values.

Remediation

Fixed in 2026.2.21 by sanitizing skill env overrides and blocking dangerous host env keys (including NODE_OPTIONS) before applying overrides, with regression tests covering blocked dangerous keys.

Fix Commit(s)

  • 8c9f35cdb51692b650ddf05b259ccdd75cc9a83c

Found using MCPwner

Пакеты

Наименование

openclaw

npm
Затронутые версииВерсия исправления

< 2026.2.21

2026.2.21

EPSS

Процентиль: 25%
0.00087
Низкий

5.1 Medium

CVSS4

Дефекты

CWE-1341
CWE-15
CWE-94

Связанные уязвимости

CVSS3: 6.3
nvd
30 дней назад

A vulnerability was determined in OpenClaw 2026.2.19-2. This vulnerability affects the function applySkillConfigenvOverrides of the component Skill Env Handler. Executing a manipulation can lead to code injection. It is possible to launch the attack remotely. Upgrading to version 2026.2.21-beta.1 is able to resolve this issue. This patch is called 8c9f35cdb51692b650ddf05b259ccdd75cc9a83c. It is recommended to upgrade the affected component.

EPSS

Процентиль: 25%
0.00087
Низкий

5.1 Medium

CVSS4

Дефекты

CWE-1341
CWE-15
CWE-94