No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 11 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw before 2026.4.22 allows workspace dotenv files to override connector endpoint hosts for Matrix, Mattermost, IRC, and Synology connectors. Attackers with workspace access can redirect runtime traffic to malicious endpoints by setting endpoint variables in dotenv files. | |
| Title | OpenClaw < 2026.4.22 - Connector Endpoint Host Override via Workspace dotenv Files | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-441 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-11T17:25:09.458Z
Reserved: 2026-05-08T16:43:53.068Z
Link: CVE-2026-45003
Updated: 2026-05-11T17:25:06.209Z
Status : Received
Published: 2026-05-11T18:16:40.523
Modified: 2026-05-11T18:16:40.523
Link: CVE-2026-45003
No data.
OpenCVE Enrichment
No data.