<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Environment-Variable-Injection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/environment-variable-injection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/environment-variable-injection/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Environment Variable Injection Vulnerability (CVE-2026-41384)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-env-injection/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-env-injection/</guid><description>OpenClaw before 2026.3.24 is vulnerable to environment variable injection, allowing attackers to inject malicious environment variables through crafted workspace configurations in the CLI backend, leading to potential code execution or sensitive data exposure.</description><content:encoded><![CDATA[<p>OpenClaw, a CLI tool, is vulnerable to environment variable injection (CVE-2026-41384) in versions prior to 2026.3.24. The vulnerability resides in the CLI backend runner and allows attackers to inject malicious environment variables into the backend process. This is achieved by crafting malicious workspace configurations. Successful exploitation can lead to arbitrary code execution within the context of the OpenClaw process or exposure of sensitive information handled by the application. This vulnerability poses a significant risk to systems using affected versions of OpenClaw, potentially allowing attackers to compromise the confidentiality, integrity, and availability of the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious OpenClaw workspace configuration file. This file contains specially crafted environment variables designed to inject malicious code.</li>
<li>The attacker gains access to a system where OpenClaw is installed, either through local access or by compromising an account that has access to modify OpenClaw workspace configurations.</li>
<li>The attacker modifies the existing OpenClaw workspace configuration or creates a new one with the malicious environment variables.</li>
<li>The user or system executes a command using the OpenClaw CLI, triggering the backend runner.</li>
<li>The OpenClaw CLI backend runner parses the workspace configuration file, including the attacker-controlled environment variables.</li>
<li>The backend runner spawns a new process, inheriting the injected environment variables.</li>
<li>The injected environment variables cause the spawned process to execute arbitrary code, potentially downloading and executing malware or modifying system settings.</li>
<li>The attacker achieves code execution, enabling them to perform various malicious activities such as data exfiltration, privilege escalation, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-41384) allows attackers to inject arbitrary environment variables, potentially leading to code execution or sensitive data exposure. Given the nature of CLI tools often used in automated scripting and deployment pipelines, this could lead to widespread compromise across multiple systems. The severity is rated as HIGH with a CVSS v3.1 score of 7.8.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.24 or later to remediate CVE-2026-41384.</li>
<li>Implement strict access control policies to limit who can modify OpenClaw workspace configurations to prevent unauthorized injection of malicious environment variables.</li>
<li>Monitor process creation events for unusual processes spawned by OpenClaw, using the <code>OpenClaw Suspicious Child Processes</code> Sigma rule.</li>
<li>Implement file integrity monitoring on OpenClaw workspace configuration files to detect unauthorized modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>environment-variable-injection</category><category>code-execution</category><category>cve-2026-41384</category></item><item><title>OpenClaw Environment Variable Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-openclaw-env-injection/</link><pubDate>Fri, 17 Apr 2026 21:54:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-openclaw-env-injection/</guid><description>The openclaw package versions prior to 2026.4.10 are vulnerable to environment variable injection, where the exec environment policy missed interpreter startup variables allowing operator-supplied environment overrides to influence downstream execution or network behavior, addressed in versions 2026.4.10 and later.</description><content:encoded><![CDATA[<p>The <code>openclaw</code> package, a tool used within the npm ecosystem, was found to have a vulnerability affecting versions prior to 2026.4.10. This vulnerability stems from an inadequate environment variable denylist in the exec environment policy. Specifically, the policy failed to block high-risk interpreter startup variables such as <code>VIMINIT</code>, <code>EXINIT</code>, <code>LUA_INIT</code>, and <code>HOSTALIASES</code>. This oversight allowed malicious actors to potentially inject arbitrary environment variables, thereby influencing the behavior of downstream execution or network operations. The vulnerability was reported by @feiyang666 of Tencent zhuque Lab. The fix was implemented in version 2026.4.10 and later, with version 2026.4.14 containing the fix as well. This vulnerability allows for potential code execution or network manipulation through environment variables.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains control over an environment where the vulnerable <code>openclaw</code> package is utilized.</li>
<li>The attacker identifies that the <code>openclaw</code> version is prior to 2026.4.10.</li>
<li>The attacker injects a malicious environment variable, such as <code>VIMINIT</code>, <code>EXINIT</code>, <code>LUA_INIT</code>, or <code>HOSTALIASES</code>, into the system&rsquo;s environment.</li>
<li>The <code>openclaw</code> package executes a process that reads and utilizes environment variables without proper sanitization.</li>
<li>The injected environment variable overrides the intended behavior of the process. For example, <code>VIMINIT</code> can be used to execute arbitrary vim commands upon startup.</li>
<li>This execution leads to arbitrary code execution or modified network behavior, depending on the injected variable. For example, <code>HOSTALIASES</code> can redirect network requests to attacker-controlled servers.</li>
<li>The attacker achieves their objective, such as gaining unauthorized access, exfiltrating data, or causing denial of service.</li>
<li>The attacker leverages the compromised environment to propagate the attack further.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability allows for arbitrary code execution or network redirection by injecting malicious environment variables. Successful exploitation could lead to unauthorized access to sensitive data, system compromise, or denial-of-service conditions. The specific impact depends on the context in which <code>openclaw</code> is used and the permissions of the user running the affected process. The reported vulnerability has been fixed in <code>openclaw</code> version 2026.4.10 and later.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>openclaw</code> package to version 2026.4.10 or later to remediate the vulnerability, as indicated in the advisory (<a href="https://github.com/advisories/GHSA-vfp4-8x56-j7c5">https://github.com/advisories/GHSA-vfp4-8x56-j7c5</a>).</li>
<li>Monitor process execution for the presence of environment variables being passed to child processes, focusing on <code>VIMINIT</code>, <code>EXINIT</code>, <code>LUA_INIT</code>, and <code>HOSTALIASES</code>. Implement the Sigma rule below to detect suspicious process execution involving these variables.</li>
<li>Implement a system-wide policy to restrict the modification of environment variables by non-administrative users.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>npm</category><category>openclaw</category><category>environment-variable-injection</category><category>vulnerability</category></item><item><title>OpenClaw RCE via Build Tool Environment Variable Injection</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-openclaw-rce/</link><pubDate>Thu, 09 Apr 2026 14:22:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-openclaw-rce/</guid><description>OpenClaw versions prior to 2026.4.8 are vulnerable to remote code execution (RCE) via build tool environment variable injection due to missing denylist entries for HGRCPATH, CARGO_BUILD_RUSTC_WRAPPER, RUSTC_WRAPPER, and MAKEFLAGS, allowing hostile environment variables to influence host exec commands.</description><content:encoded><![CDATA[<p>OpenClaw, a user-controlled local assistant, is vulnerable to a remote code execution (RCE) issue affecting versions prior to 2026.4.8. The vulnerability, identified as GHSA-cm8v-2vh9-cxf3, stems from missing denylist entries for environment variables that influence build tools. Specifically, HGRCPATH, CARGO_BUILD_RUSTC_WRAPPER, RUSTC_WRAPPER, and MAKEFLAGS were not properly sanitized, allowing a malicious actor to inject arbitrary commands into the build process. This can lead to the execution of untrusted code on the host system. The vulnerability was reported by @boy-hack of Tencent zhuque Lab. The fix is available in version 2026.4.8 and commit d7c3210cd6f5fdfdc1beff4c9541673e814354d5. This advisory is scoped to the OpenClaw trust model and does not assume a multi-tenant service boundary.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable OpenClaw instance running a version prior to 2026.4.8.</li>
<li>The attacker crafts malicious environment variables, such as HGRCPATH, CARGO_BUILD_RUSTC_WRAPPER, RUSTC_WRAPPER, or MAKEFLAGS, containing shell commands.</li>
<li>The attacker triggers a build process within OpenClaw that utilizes the affected environment variables. This could involve providing a specific input or interacting with OpenClaw in a way that initiates a build operation.</li>
<li>Due to the missing denylist, OpenClaw does not sanitize the malicious environment variables.</li>
<li>The build tool, influenced by the attacker-controlled environment variables, executes the injected shell commands.</li>
<li>The injected commands execute with the privileges of the OpenClaw process.</li>
<li>The attacker gains arbitrary code execution on the host system.</li>
<li>The attacker can now perform actions such as installing malware, exfiltrating data, or compromising other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the system running OpenClaw. This could lead to complete system compromise, including data theft, malware installation, and further lateral movement within the network. Given OpenClaw&rsquo;s nature as a user-controlled local assistant, the impact is primarily on individual user systems. However, in environments where OpenClaw is deployed more broadly, the vulnerability could be leveraged to compromise multiple machines.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.8 or later to patch the vulnerability (see &ldquo;Affected Packages / Versions&rdquo;).</li>
<li>Monitor process creation events for unexpected processes spawned by OpenClaw or its build tool subprocesses (see rules below).</li>
<li>Implement additional input validation and sanitization measures to prevent environment variable injection in other applications.</li>
<li>Review and harden build processes to limit the influence of environment variables.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rce</category><category>environment-variable-injection</category><category>openclaw</category></item><item><title>OpenClaw NPM Package Vulnerable to Python Package Index Redirection</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-index-redirect/</link><pubDate>Thu, 02 Apr 2026 20:57:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-index-redirect/</guid><description>The openclaw npm package is vulnerable to Python package-index redirection through host execution due to improper sanitization of `PIP_INDEX_URL` and `UV_INDEX_URL`, affecting versions 2026.3.28 and earlier.</description><content:encoded><![CDATA[<p>The <code>openclaw</code> npm package, versions 2026.3.28 and earlier, contains a vulnerability that allows for the redirection of Python package-index traffic. This is due to insufficient sanitization of the <code>PIP_INDEX_URL</code> and <code>UV_INDEX_URL</code> environment variables during host execution. An attacker can potentially exploit this vulnerability to redirect package installation traffic to a malicious index, potentially leading to the installation of compromised packages. The scope of this vulnerability is limited to approved or allowlisted package-management execution paths, mitigating the risk of arbitrary remote execution. Version 2026.3.31 and later contain the fix. The vulnerability was reported by @nexrin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a system using a vulnerable version (&lt;=2026.3.28) of the <code>openclaw</code> npm package.</li>
<li>The attacker gains access to the system or its environment configuration.</li>
<li>The attacker sets either the <code>PIP_INDEX_URL</code> or <code>UV_INDEX_URL</code> environment variable to point to a malicious Python package index server.</li>
<li>The system executes a package installation command (e.g., <code>pip install &lt;package&gt;</code>) through <code>openclaw</code>.</li>
<li><code>openclaw</code>, without proper sanitization, uses the attacker-controlled environment variable when resolving package dependencies.</li>
<li>The package manager connects to the malicious index server specified in the <code>PIP_INDEX_URL</code> or <code>UV_INDEX_URL</code> variable.</li>
<li>The attacker serves malicious or backdoored Python packages through the rogue index.</li>
<li>The system installs the malicious packages, potentially compromising the system with arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to the installation of malicious Python packages on systems utilizing the vulnerable <code>openclaw</code> version. This could result in arbitrary code execution, data theft, or other malicious activities, depending on the contents of the malicious packages. The scope is somewhat limited since only allowlisted execution paths are affected, which reduces the blast radius.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>openclaw</code> npm package to version 2026.3.31 or later to remediate the vulnerability.</li>
<li>Monitor process executions involving <code>openclaw</code> and the use of <code>PIP_INDEX_URL</code> or <code>UV_INDEX_URL</code> environment variables. Deploy the Sigma rule <code>Detect OpenClaw Using Suspicious Index URL</code> to detect exploitation attempts.</li>
<li>Implement strict allowlisting of package management execution paths to further limit the potential impact.</li>
<li>Enable process creation logging to capture command line arguments and environment variables for the <code>openclaw</code> process.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openclaw</category><category>npm</category><category>package-index-redirection</category><category>environment-variable-injection</category></item></channel></rss>