<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Environment_variable_override — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/environment_variable_override/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 20:16:35 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/environment_variable_override/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Improper Environment Variable Handling Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-openclaw-env-override/</link><pubDate>Wed, 06 May 2026 20:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-openclaw-env-override/</guid><description>OpenClaw before 2026.4.20 is vulnerable to improper environment variable namespace reservation, allowing attackers to override critical runtime variables via workspace dotenv files.</description><content:encoded><![CDATA[<p>OpenClaw versions prior to 2026.4.20 are susceptible to an environment variable namespace collision vulnerability. This flaw stems from the application&rsquo;s failure to properly reserve the <code>OPENCLAW_</code> runtime-control environment namespace within workspace dotenv files. By crafting malicious workspaces, attackers can set variables like <code>OPENCLAW_GIT_DIR</code> to manipulate OpenClaw runtime behavior during critical operations, such as source updates and installer workflows. This vulnerability allows for the potential hijacking of trusted OpenClaw runtime processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious workspace containing a dotenv file.</li>
<li>The dotenv file includes environment variables prefixed with <code>OPENCLAW_</code>, such as <code>OPENCLAW_GIT_DIR</code>.</li>
<li>The victim user imports or uses the attacker-controlled workspace in OpenClaw.</li>
<li>OpenClaw loads the dotenv file, inadvertently overriding its own runtime configuration.</li>
<li>During a source-update operation, OpenClaw uses the attacker-controlled <code>OPENCLAW_GIT_DIR</code> to locate the Git repository.</li>
<li>The attacker redirects OpenClaw to a malicious Git repository under their control.</li>
<li>OpenClaw executes commands from the attacker&rsquo;s malicious Git repository, leading to code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code within the context of the OpenClaw application. This could lead to the compromise of the user&rsquo;s system, data exfiltration, or further malicious activities. Given the potentially widespread use of OpenClaw in development environments, this vulnerability poses a significant risk to organizations using affected versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to OpenClaw version 2026.4.20 or later to remediate the vulnerability (CVE-2026-44114).</li>
<li>Implement file integrity monitoring on workspace dotenv files to detect unauthorized modifications.</li>
<li>Deploy the Sigma rule <code>Detect OpenClaw Environment Variable Overrides</code> to identify suspicious processes modifying OpenClaw&rsquo;s runtime behavior.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>environment_variable_override</category><category>code_execution</category></item></channel></rss>