Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mc68-q9jw-2h3v

Опубликовано: 02 фев. 2026
Источник: github
Github: Прошло ревью
CVSS3: 8.8

Описание

OpenClaw/Clawdbot Docker Execution has Authenticated Command Injection via PATH Environment Variable

Summary

A Command Injection vulnerability existed in Clawdbot’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment variable when constructing shell commands.

An authenticated user able to control environment variables could influence command execution within the container context. This issue has been fixed and regression tests have been added to prevent reintroduction.

Impact

In environments where Docker sandbox mode was enabled, authenticated users capable of supplying environment variables could affect the behavior of commands executed inside the container.

This could lead to:

  1. Execution of unintended commands inside the container
  2. Access to the container filesystem and environment variables
  3. Exposure of sensitive data
  4. Increased risk in misconfigured or privileged container environments

Пакеты

Наименование

clawdbot

npm
Затронутые версииВерсия исправления

<= 2026.1.24

2026.1.29

EPSS

Процентиль: 20%
0.00066
Низкий

8.8 High

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 8.8
nvd
4 дня назад

OpenClaw (formerly Clawdbot) is a personal AI assistant you run on your own devices. Prior to 2026.1.29, a command injection vulnerability existed in OpenClaw’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment variable when constructing shell commands. An authenticated user able to control environment variables could influence command execution within the container context. This vulnerability is fixed in 2026.1.29.

EPSS

Процентиль: 20%
0.00066
Низкий

8.8 High

CVSS3

Дефекты

CWE-78