⚠ Withdrawn by GitHub Security Advisories
Withdrawn: May 18, 2026
GHSA-p3m6-jr2h-hhxjMediumCVSS 7.3Disclosed before NVD
Duplicate Advisory: OpenClaw: MCP stdio server env could load dangerous startup variables from workspace config
📋 Description
### Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-mj59-h3q9-ghfh. This link is maintained to preserve external references.
### Original Description
OpenClaw before 2026.4.20 contains an improper environment variable validation vulnerability in MCP stdio server configuration that allows attackers to execute arbitrary code. Malicious workspace configurations can pass dangerous startup variables like NODE_OPTIONS, LD_PRELOAD, or BASH_ENV to spawned MCP server processes, enabling code injection when operators start sessions using those servers.
🎯 Affected products1
- npm/openclaw:< 2026.4.20
🔗 References (6)
- https://github.com/openclaw/openclaw/security/advisories/GHSA-mj59-h3q9-ghfh
- https://nvd.nist.gov/vuln/detail/CVE-2026-44995
- https://github.com/openclaw/openclaw/commit/62fa5071896e95edc7f67d1cebc70a2859e283af
- https://github.com/openclaw/openclaw/commit/85d86ebc4bf3d2226d39d132a484f4f7a299fa1b
- https://www.vulncheck.com/advisories/openclaw-arbitrary-code-execution-via-mcp-stdio-environment-variables
- https://github.com/advisories/GHSA-p3m6-jr2h-hhxj