Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-41294

CVE-2026-41294: OpenClaw Environment Injection Vulnerability

CVE-2026-41294 is an environment variable injection flaw in OpenClaw that allows attackers to override security-sensitive settings via malicious .env files. This article covers technical details, affected versions, and mitigation.

Published: April 23, 2026

CVE-2026-41294 Overview

OpenClaw before version 2026.3.28 contains an environment variable injection vulnerability that stems from improper loading order of .env configuration files. The application loads the current working directory (CWD) .env file before trusted state-dir configuration, enabling attackers to override runtime configuration and security-sensitive environment settings during OpenClaw startup.

Critical Impact

Attackers can place a malicious .env file in a repository or workspace to inject arbitrary environment variables, potentially hijacking application behavior, exfiltrating credentials, or escalating privileges within the affected system.

Affected Products

  • OpenClaw versions prior to 2026.3.28

Discovery Timeline

  • 2026-04-21 - CVE-2026-41294 published to NVD
  • 2026-04-21 - Last updated in NVD database

Technical Details for CVE-2026-41294

Vulnerability Analysis

This vulnerability is classified under CWE-15 (External Control of System or Configuration Setting), which describes scenarios where an application allows external input to control system-level configurations without proper validation. In the case of OpenClaw, the application's startup sequence incorrectly prioritizes an untrusted .env file from the current working directory over the established state-dir configuration.

The flaw creates a scenario where any user who can place files in a directory where OpenClaw might be executed gains the ability to manipulate the application's runtime behavior. This is particularly dangerous in shared development environments, CI/CD pipelines, or when cloning untrusted repositories that may contain malicious .env files.

Root Cause

The root cause lies in the configuration loading order within OpenClaw's initialization routine. The application reads and processes environment variables from the CWD .env file before loading the trusted state-dir configuration, violating the principle of least privilege. This design flaw means that a locally placed .env file takes precedence over administrator-defined secure configurations.

Attack Vector

The attack requires local access (AV:L) with no privileges required to exploit. An attacker can:

  1. Place a crafted .env file in a directory where a victim is likely to execute OpenClaw
  2. Wait for the victim to run OpenClaw from that directory (requires user interaction)
  3. The malicious environment variables are loaded and applied during startup
  4. The attacker's injected configuration overrides security-sensitive settings

Common attack scenarios include:

  • Planting malicious .env files in cloned Git repositories
  • Placing .env files in shared workspace directories
  • Targeting CI/CD pipeline directories where OpenClaw is executed

The vulnerability could be exploited to redirect API endpoints, modify authentication tokens, disable security features, or inject malicious paths into the application's runtime environment.

Detection Methods for CVE-2026-41294

Indicators of Compromise

  • Unexpected .env files appearing in repository roots or workspace directories
  • Modified environment variables in OpenClaw process context that differ from expected state-dir configuration
  • Unusual network connections or API calls originating from OpenClaw processes
  • File creation timestamps showing .env files created by non-administrative users

Detection Strategies

  • Monitor file system events for .env file creation in directories where OpenClaw is commonly executed
  • Implement file integrity monitoring on known OpenClaw execution directories
  • Audit process environment variables during OpenClaw startup to detect unauthorized overrides
  • Review Git repository contents for suspicious .env files before cloning or pulling

Monitoring Recommendations

  • Enable verbose logging for OpenClaw configuration loading to track which .env files are processed
  • Configure SIEM alerts for OpenClaw processes with unexpected environment variable values
  • Implement endpoint detection rules that flag .env file creation in monitored directories
  • Regularly scan repositories and workspaces for potentially malicious .env files

How to Mitigate CVE-2026-41294

Immediate Actions Required

  • Upgrade OpenClaw to version 2026.3.28 or later immediately
  • Audit all existing .env files in directories where OpenClaw has been executed
  • Review environment variable configurations in CI/CD pipelines that use OpenClaw
  • Scan cloned repositories for unexpected .env files before execution

Patch Information

The vulnerability is fixed in OpenClaw version 2026.3.28, which corrects the configuration loading order to prioritize trusted state-dir configuration over CWD .env files. For detailed information about the fix, refer to the GitHub Security Advisory or the VulnCheck Advisory.

Workarounds

  • Avoid executing OpenClaw from untrusted directories or cloned repositories
  • Remove or rename any untrusted .env files before running OpenClaw in a directory
  • Use explicit state-dir configuration paths and avoid relying on CWD-based configuration loading
  • Implement directory-level access controls to prevent unauthorized .env file creation in OpenClaw execution paths
  • Consider running OpenClaw in isolated environments or containers where the working directory can be strictly controlled
bash
# Verify OpenClaw version and check for vulnerable installations
openclaw --version

# Remove untrusted .env files before execution
find /path/to/workspace -name ".env" -type f -mtime -7 -ls

# Set explicit state-dir to override CWD configuration
export OPENCLAW_STATE_DIR=/etc/openclaw/trusted-config

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechOpenclaw

  • SeverityHIGH

  • CVSS Score8.5

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-15
  • Technical References
  • GitHub Security Advisory

  • VulnCheck Advisory
  • Related CVEs
  • CVE-2026-35659: Openclaw Service Discovery Vulnerability

  • CVE-2026-27007: OpenClaw Config Integrity Vulnerability

  • CVE-2026-24764: Openclaw Prompt Injection Vulnerability

  • CVE-2026-41909: OpenClaw Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English