CVE-2026-43584
Published: 06 May 2026
Summary
CVE-2026-43584 is a high-severity Incomplete List of Disallowed Inputs (CWE-184) vulnerability in Openclaw Openclaw. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Unix Shell (T1059.004); ranked at the 30.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Spam filters rely on evolving blacklists, signatures, and heuristics of disallowed message patterns; keeping them updated per the control directly mitigates incomplete disallowed-input lists.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability allows manipulation of interpreter init vars (VIMINIT/EXINIT/LUA_INIT) and HOSTALIASES to alter execution or resolution behavior.
NVD Description
OpenClaw before 2026.4.10 contains an insufficient environment variable denylist vulnerability in its exec environment policy that allows operator-supplied overrides of high-risk interpreter startup variables including VIMINIT, EXINIT, LUA_INIT, and HOSTALIASES. Attackers can exploit this by manipulating these environment variables to…
more
influence downstream execution behavior or network connectivity.
Deeper analysisAI
Automated synthesis unavailable for this CVE.
Details
- CWE(s)