CVE-2026-41396
Received Received - Intake
Environment Variable Override Vulnerability in OpenClaw Plugin Verification

Publication date: 2026-04-28

Last updated on: 2026-04-30

Assigner: VulnCheck

Description
OpenClaw before 2026.3.31 allows workspace .env files to override the OPENCLAW_BUNDLED_PLUGINS_DIR environment variable, compromising plugin trust verification. Attackers with control over workspace configuration can inject malicious plugins by overriding the bundled plugin trust root directory.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-28
Last Modified
2026-04-30
Generated
2026-05-06
AI Q&A
2026-04-28
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
openclaw openclaw to 2026.3.31 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-829 The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

The vulnerability can lead to serious security risks because it allows attackers with control over the workspace to load malicious plugins.

This can compromise the confidentiality, integrity, and availability of the system using OpenClaw.

However, exploitation requires local access to the workspace and user interaction, so it is not a universal remote code execution vulnerability.


Can you explain this vulnerability to me?

CVE-2026-41396 is a vulnerability in OpenClaw versions before 2026.3.31 where workspace .env files can override the environment variable OPENCLAW_BUNDLED_PLUGINS_DIR.

This environment variable defines the trusted root directory for bundled plugins. By overriding it, an attacker who controls the workspace configuration can compromise the plugin trust verification mechanism.

This allows the attacker to inject malicious plugins by redirecting the plugin trust root to a location they control.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves workspace .env files overriding the OPENCLAW_BUNDLED_PLUGINS_DIR environment variable, which compromises plugin trust verification.

To detect this vulnerability on your system, you should check for the presence of .env files in your OpenClaw workspace that set or override the OPENCLAW_BUNDLED_PLUGINS_DIR environment variable.

  • Use commands like `grep -r OPENCLAW_BUNDLED_PLUGINS_DIR /path/to/workspace` to search for environment variable overrides in .env files.
  • Inspect the environment variables in the running OpenClaw process to see if OPENCLAW_BUNDLED_PLUGINS_DIR is set to an unexpected or attacker-controlled path.
  • Verify the OpenClaw version installed by running `openclaw --version` or checking package metadata to ensure it is version 2026.3.31 or later, where the vulnerability is fixed.

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to upgrade OpenClaw to version 2026.3.31 or later, where the vulnerability has been fixed by removing the ability for workspace .env files to override the bundled plugin trust root.

Additionally, restrict or audit access to workspace configuration files to prevent attackers from modifying .env files and injecting malicious plugins.

Avoid running OpenClaw processes with unnecessary user privileges and monitor for any suspicious changes to environment variables related to plugin loading.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify how CVE-2026-41396 affects compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart