Home » Database

AVID-2026-R0214

Description

Authenticated Command Injection in OpenClaw Docker Execution via PATH Environment Variable (CVE-2026-24763)

Details

OpenClaw (formerly Clawdbot) is a personal AI assistant you run on your own devices. Prior to 2026.1.29, a command injection vulnerability existed in OpenClaw’s Docker sandbox execution mechanism due to unsafe handling of the PATH environment variable when constructing shell commands. An authenticated user able to control environment variables could influence command execution within the container context. This vulnerability is fixed in 2026.1.29.

References

Affected or Relevant Artifacts

  • Developer: clawdbot
  • Deployer: clawdbot
  • Artifact Details:
TypeName
Systemclawdbot

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score8.8
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges Required🟢 Low
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-78CWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2026-02-02
  • Version: 0.3
  • AVID Entry