<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-41384 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-41384/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-41384/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Environment Variable Injection Vulnerability (CVE-2026-41384)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-env-injection/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-env-injection/</guid><description>OpenClaw before 2026.3.24 is vulnerable to environment variable injection, allowing attackers to inject malicious environment variables through crafted workspace configurations in the CLI backend, leading to potential code execution or sensitive data exposure.</description><content:encoded><![CDATA[<p>OpenClaw, a CLI tool, is vulnerable to environment variable injection (CVE-2026-41384) in versions prior to 2026.3.24. The vulnerability resides in the CLI backend runner and allows attackers to inject malicious environment variables into the backend process. This is achieved by crafting malicious workspace configurations. Successful exploitation can lead to arbitrary code execution within the context of the OpenClaw process or exposure of sensitive information handled by the application. This vulnerability poses a significant risk to systems using affected versions of OpenClaw, potentially allowing attackers to compromise the confidentiality, integrity, and availability of the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious OpenClaw workspace configuration file. This file contains specially crafted environment variables designed to inject malicious code.</li>
<li>The attacker gains access to a system where OpenClaw is installed, either through local access or by compromising an account that has access to modify OpenClaw workspace configurations.</li>
<li>The attacker modifies the existing OpenClaw workspace configuration or creates a new one with the malicious environment variables.</li>
<li>The user or system executes a command using the OpenClaw CLI, triggering the backend runner.</li>
<li>The OpenClaw CLI backend runner parses the workspace configuration file, including the attacker-controlled environment variables.</li>
<li>The backend runner spawns a new process, inheriting the injected environment variables.</li>
<li>The injected environment variables cause the spawned process to execute arbitrary code, potentially downloading and executing malware or modifying system settings.</li>
<li>The attacker achieves code execution, enabling them to perform various malicious activities such as data exfiltration, privilege escalation, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-41384) allows attackers to inject arbitrary environment variables, potentially leading to code execution or sensitive data exposure. Given the nature of CLI tools often used in automated scripting and deployment pipelines, this could lead to widespread compromise across multiple systems. The severity is rated as HIGH with a CVSS v3.1 score of 7.8.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.24 or later to remediate CVE-2026-41384.</li>
<li>Implement strict access control policies to limit who can modify OpenClaw workspace configurations to prevent unauthorized injection of malicious environment variables.</li>
<li>Monitor process creation events for unusual processes spawned by OpenClaw, using the <code>OpenClaw Suspicious Child Processes</code> Sigma rule.</li>
<li>Implement file integrity monitoring on OpenClaw workspace configuration files to detect unauthorized modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>environment-variable-injection</category><category>code-execution</category><category>cve-2026-41384</category></item></channel></rss>