OpenClaw: MCP stdio server env could load dangerous startup variables from workspace config
Moderate severity
GitHub Reviewed
Published
Apr 21, 2026
in
openclaw/openclaw
•
Updated Apr 25, 2026
Description
Published to the GitHub Advisory Database
Apr 25, 2026
Reviewed
Apr 25, 2026
Last updated
Apr 25, 2026
Affected Packages / Versions
openclaw(npm)< 2026.4.202026.4.20Impact
Workspace MCP stdio configuration could pass dangerous process-startup environment variables such as
NODE_OPTIONS,LD_PRELOAD, orBASH_ENVto the spawned MCP server process. In a malicious workspace, this could make the MCP child load attacker-controlled code when the operator starts a session that uses that MCP server.The impact is limited to local/workspace trust boundaries and requires the operator to run OpenClaw in a workspace containing the malicious MCP configuration. Severity is therefore medium, not high/critical.
Fix
OpenClaw now filters MCP stdio environment entries through the host environment safety denylist before spawning stdio MCP servers.
Fix commits:
62fa5071896e95edc7f67d1cebc70a2859e283af85d86ebc4bf3d2226d39d132a484f4f7a299fa1bRelease
Fixed in OpenClaw
2026.4.20.References