PT-2026-20963 · Openclaw · Openclaw

Aether-Ai-Agent

·

Published

2026-02-18

·

Updated

2026-03-27

·

CVE-2026-27001

CVSS v4.0

8.6

High

AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Name of the Vulnerable Software and Affected Versions OpenClaw versions prior to 2026.2.15
Description OpenClaw embedded the current working directory (workspace path) into the agent system prompt without proper sanitization. An attacker could potentially exploit this by creating a directory with control or format characters, such as newlines or Unicode bidi/zero-width markers. These characters could disrupt the prompt structure and allow the attacker to inject malicious instructions. This prompt injection could alter the agent's behavior, potentially leading to unintended tool use or the disclosure of sensitive information. The vulnerable component is the process of embedding the workspace path into the Large Language Model (LLM) prompt.
Recommendations Update OpenClaw to version 2026.2.15 or later.

Exploit

Fix

Command Injection

Weakness Enumeration

Related Identifiers

CVE-2026-27001
GHSA-2QJ5-GWG2-XWC4

Affected Products

Openclaw