<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>MCP Stdio Server — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/mcp-stdio-server/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 18:18:26 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/mcp-stdio-server/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw MCP Stdio Server Environment Variable Injection Vulnerability (CVE-2026-44995)</title><link>https://feed.craftedsignal.io/briefs/2026-05-openclaw-env-var-injection/</link><pubDate>Mon, 11 May 2026 18:18:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-openclaw-env-var-injection/</guid><description>OpenClaw before 2026.4.20 contains an improper environment variable validation vulnerability (CVE-2026-44995) in MCP stdio server configuration, allowing attackers to execute arbitrary code via malicious workspace configurations that pass dangerous startup variables.</description><content:encoded><![CDATA[<p>OpenClaw before version 2026.4.20 is vulnerable to an improper environment variable validation in its MCP stdio server configuration. This vulnerability, tracked as CVE-2026-44995, allows attackers to execute arbitrary code on systems running affected versions of OpenClaw. The attack involves crafting malicious workspace configurations that inject dangerous startup variables, such as NODE_OPTIONS, LD_PRELOAD, or BASH_ENV, into spawned MCP server processes. This injection leads to arbitrary code execution when operators initiate sessions using those compromised servers. This poses a significant risk to organizations utilizing OpenClaw, as it can lead to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious OpenClaw workspace configuration.</li>
<li>The malicious configuration includes specially crafted environment variables such as <code>NODE_OPTIONS</code>, <code>LD_PRELOAD</code>, or <code>BASH_ENV</code>.</li>
<li>An operator unwittingly loads the malicious workspace configuration in OpenClaw.</li>
<li>OpenClaw spawns an MCP stdio server process, inheriting the attacker-controlled environment variables.</li>
<li>The injected environment variables cause the spawned MCP server process to load attacker-supplied code.</li>
<li>Arbitrary code is executed within the context of the MCP server process.</li>
<li>The attacker gains control over the affected system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-44995 can lead to arbitrary code execution on the OpenClaw server. An attacker can use this to gain complete control of the system, potentially leading to data theft, system compromise, or denial of service. This vulnerability impacts any organization using OpenClaw versions prior to 2026.4.20.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.20 or later to patch CVE-2026-44995.</li>
<li>Implement the Sigma rule <code>Detect Suspicious OpenClaw Environment Variables</code> to identify potentially malicious workspace configurations.</li>
<li>Monitor process creation events for the use of <code>NODE_OPTIONS</code>, <code>LD_PRELOAD</code>, or <code>BASH_ENV</code> environment variables in OpenClaw MCP stdio server processes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>code-execution</category><category>environment-variable-injection</category></item></channel></rss>