Описание
OpenClaw/Clawdbot Docker Execution has Authenticated Command Injection via PATH Environment Variable
Summary
A Command Injection vulnerability existed in Clawdbot’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment variable when constructing shell commands.
An authenticated user able to control environment variables could influence command execution within the container context. This issue has been fixed and regression tests have been added to prevent reintroduction.
Impact
In environments where Docker sandbox mode was enabled, authenticated users capable of supplying environment variables could affect the behavior of commands executed inside the container.
This could lead to:
- Execution of unintended commands inside the container
- Access to the container filesystem and environment variables
- Exposure of sensitive data
- Increased risk in misconfigured or privileged container environments
Ссылки
- https://github.com/clawdbot/clawdbot/security/advisories/GHSA-mc68-q9jw-2h3v
- https://github.com/openclaw/openclaw/security/advisories/GHSA-mc68-q9jw-2h3v
- https://nvd.nist.gov/vuln/detail/CVE-2026-24763
- https://github.com/openclaw/openclaw/commit/771f23d36b95ec2204cc9a0054045f5d8439ea75
- https://github.com/openclaw/openclaw/releases/tag/v2026.1.29
Пакеты
clawdbot
<= 2026.1.24
2026.1.29
Связанные уязвимости
OpenClaw (formerly Clawdbot) is a personal AI assistant you run on your own devices. Prior to 2026.1.29, a command injection vulnerability existed in OpenClaw’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment variable when constructing shell commands. An authenticated user able to control environment variables could influence command execution within the container context. This vulnerability is fixed in 2026.1.29.