UNKNOWNGHSA-8rh7-6779-cjqq

OpenClaw has a CWD `.env` environment variable injection which bypasses host-env policy and allows config takeover

Platform

nodejs

Component

openclaw

Fixed in

2026.3.28

## Summary OpenClaw loaded the current working directory `.env` before trusted state-dir configuration, allowing untrusted workspace state to inject host environment values. ## Impact A repository or workspace containing a malicious `.env` file could override runtime configuration and security-sensitive environment settings when OpenClaw started there. ## Affected Component `src/infra/dotenv.ts, src/cli/dotenv.ts` ## Fixed Versions - Affected: `<= 2026.3.24` - Patched: `>= 2026.3.28` - Latest stable `2026.3.28` contains the fix. ## Fix Fixed by commit `6a79324802` (`Filter untrusted CWD .env entries before OpenClaw startup`).

How to fix

No official patch available. Check for workarounds or monitor for updates.

Monitor your dependencies automatically

Get notified when new vulnerabilities affect your projects. Free forever.

Start free
GHSA-8rh7-6779-cjqq — Vulnerability Details | NextGuard | NextGuard