OpenClaw before 2026.4.8 fails to remove git plumbing environment variables from the execution environment before host exec operations. Attackers can exploit this by setting GIT_DIR and related variables to redirect git operations and compromise repository integrity.
Exploitability
AV:LAC:HAT:NPR:LUI:NVulnerable System
VC:LVI:HVA:NSubsequent System
SC:NSI:NSA:N5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:NOther