Untriaged
Permalink
CVE-2026-34426
7.6 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): REQUIRED
- Scope (S): CHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): HIGH
- Availability impact (A): NONE
OpenClaw - Approval Bypass via Environment Variable Normalization
OpenClaw versions prior to commit b57b680 contain an approval bypass vulnerability due to inconsistent environment variable normalization between approval and execution paths, allowing attackers to inject attacker-controlled environment variables into execution without approval system validation. Attackers can exploit differing normalization logic to discard non-portable keys during approval processing while accepting them at execution time, bypassing operator review and potentially influencing runtime behavior including execution of attacker-controlled binaries.
References
-
GitHub Security Advisory (GHSA-h3x4-hc5v-v2gm) vendor-advisory
-
Patch Commit #1 issue-tracking
-
https://www.vulncheck.com/advisories/openclaw-approval-bypass-via-environment-v… third-party-advisory
Affected products
OpenClaw
- <b57b680c0c34de907d57f60c38fb358e82aef8f7
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>