OpenClaw versions prior to commit b57b680 contain an approval bypass vulnerability due to inconsistent environment variable normalization between approval and execution paths, allowing attackers to inject attacker-controlled environment variables into execution without approval system validation. Attackers can exploit differing normalization logic to discard non-portable keys during approval processing while accepting them at execution time, bypassing operator review and potentially influencing runtime behavior including execution of attacker-controlled binaries.
References
| Link | Resource |
|---|---|
| https://github.com/openclaw/openclaw/commit/b57b680c0c34de907d57f60c38fb358e82aef8f7 | Patch |
| https://github.com/openclaw/openclaw/pull/59182 | Issue Tracking Patch |
| https://github.com/openclaw/openclaw/security/advisories/GHSA-98ch-45wp-ch47 | Vendor Advisory |
| https://www.vulncheck.com/advisories/openclaw-approval-bypass-via-environment-variable-normalization | Third Party Advisory |
Configurations
History
06 Apr 2026, 20:53
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openclaw/openclaw/commit/b57b680c0c34de907d57f60c38fb358e82aef8f7 - Patch | |
| References | () https://github.com/openclaw/openclaw/pull/59182 - Issue Tracking, Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-98ch-45wp-ch47 - Vendor Advisory | |
| References | () https://www.vulncheck.com/advisories/openclaw-approval-bypass-via-environment-variable-normalization - Third Party Advisory | |
| First Time |
Openclaw openclaw
Openclaw |
|
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* |
02 Apr 2026, 19:21
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-02 19:21
Updated : 2026-04-06 20:53
NVD link : CVE-2026-34426
Mitre link : CVE-2026-34426
CVE.ORG link : CVE-2026-34426
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-184
Incomplete List of Disallowed Inputs
