GHSA-j7p2-qcwm-94v4
Summary
Host exec env override sanitization did not fail closed for several package-manager and related redirect variables that can steer dependency fetches or startup behavior.
Impact
An approved exec request could silently redirect package resolution or runtime bootstrap to attacker-controlled infrastructure and execute trojanized content.
Affected Component
src/infra/host-env-security-policy.json, src/infra/host-env-security.ts
Fixed Versions
- Affected:
< 2026.3.22 - Patched:
>= 2026.3.22
Fix
Fixed by commit 7abfff756d (Exec: harden host env override handling across gateway and node).
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/openclaw/openclaw/security/advisories/GHSA-j7p2-qcwm-94v4, https://github.com/openclaw/openclaw/commit/7abfff756d6c68d17e21d1657bbacbaec86de232, https://github.com/openclaw/openclaw, https://github.com/openclaw/openclaw/releases/tag/v2026.3.22
