<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-43531 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-43531/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 12:16:19 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-43531/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Environment Variable Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-openclaw-env-injection/</link><pubDate>Tue, 05 May 2026 12:16:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-openclaw-env-injection/</guid><description>OpenClaw before version 2026.4.9 is vulnerable to environment variable injection, allowing attackers to use malicious workspace .env files to set runtime-control variables and compromise application behavior affecting update sources, gateway URLs, ClawHub resolution, and browser executable paths.</description><content:encoded><![CDATA[<p>OpenClaw before version 2026.4.9 is susceptible to an environment variable injection vulnerability. This flaw enables attackers to manipulate runtime-control variables by crafting malicious workspace .env files. Successful exploitation can lead to the redirection of update sources to attacker-controlled servers, modification of gateway URLs to intercept traffic, alteration of ClawHub resolution to point to malicious resources, and substitution of browser executable paths to execute arbitrary code. This vulnerability allows an attacker to potentially gain control of the application&rsquo;s behavior and compromise the underlying system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious <code>.env</code> file containing environment variable definitions designed to override default application settings.</li>
<li>The attacker places the malicious <code>.env</code> file into a workspace directory accessible by the OpenClaw application.</li>
<li>OpenClaw application parses the <code>.env</code> file during startup or when a workspace is loaded.</li>
<li>The application reads the attacker-controlled environment variables, which are intended to modify update sources, gateway URLs, ClawHub resolution endpoints, and browser executable paths.</li>
<li>The attacker redirects the update source to a malicious server hosting a compromised update package.</li>
<li>The application downloads and installs the malicious update, leading to code execution.</li>
<li>Alternatively, the attacker manipulates the browser executable path to execute arbitrary code using a different application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to inject arbitrary environment variables, leading to code execution and potential system compromise. Attackers could redirect update sources, manipulate gateway URLs, or alter browser executable paths to execute malicious code. Given the potential for complete system compromise, this vulnerability poses a significant risk to organizations using affected versions of OpenClaw.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.9 or later to patch the environment variable injection vulnerability (CVE-2026-43531).</li>
<li>Implement strict file integrity monitoring on workspace directories to detect unauthorized modification of <code>.env</code> files using a file_event Sigma rule.</li>
<li>Monitor process execution for OpenClaw using unexpected browser executable paths by deploying the process_creation Sigma rule below.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>environment variable injection</category><category>application compromise</category><category>cve-2026-43531</category></item></channel></rss>