🔐 CVE Alert

CVE-2026-34426

HIGH 7.6

OpenClaw - Approval Bypass via Environment Variable Normalization

CVSS Score
7.6
EPSS Score
0.0%
EPSS Percentile
12th

OpenClaw versions prior to commit b57b680 contain an approval bypass vulnerability due to inconsistent environment variable normalization between approval and execution paths, allowing attackers to inject attacker-controlled environment variables into execution without approval system validation. Attackers can exploit differing normalization logic to discard non-portable keys during approval processing while accepting them at execution time, bypassing operator review and potentially influencing runtime behavior including execution of attacker-controlled binaries.

CWE CWE-184
Vendor openclaw
Product openclaw
Published Apr 2, 2026
Last Updated Apr 3, 2026
Stay Ahead of the Next One

Get instant alerts for openclaw openclaw

Be the first to know when new high vulnerabilities affecting openclaw openclaw are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
High
Availability
None

Affected Versions

OpenClaw / OpenClaw
0 < b57b680c0c34de907d57f60c38fb358e82aef8f7

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/openclaw/openclaw/security/advisories/GHSA-98ch-45wp-ch47 github.com: https://github.com/openclaw/openclaw/pull/59182 github.com: https://github.com/openclaw/openclaw/commit/b57b680c0c34de907d57f60c38fb358e82aef8f7 vulncheck.com: https://www.vulncheck.com/advisories/openclaw-approval-bypass-via-environment-variable-normalization

Credits

🔍 Zhijie Zhang