OpenDoas allows users to run commands as other users.
OpenDoas does not properly filter the PATH variable from the resulting shell after escalating privileges.
A local attacker with control of a user’s PATH variable could escalate privileges if that user uses OpenDoas with a poisoned PATH variable.
There is no known workaround at this time.
All OpenDoas users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-admin/doas-6.8.1"