PT-2026-20963 · Openclaw · Openclaw
Aether-Ai-Agent
·
Published
2026-02-18
·
Updated
2026-03-27
·
CVE-2026-27001
CVSS v4.0
8.6
High
| AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
Name of the Vulnerable Software and Affected Versions
OpenClaw versions prior to 2026.2.15
Description
OpenClaw embedded the current working directory (workspace path) into the agent system prompt without proper sanitization. An attacker could potentially exploit this by creating a directory with control or format characters, such as newlines or Unicode bidi/zero-width markers. These characters could disrupt the prompt structure and allow the attacker to inject malicious instructions. This prompt injection could alter the agent's behavior, potentially leading to unintended tool use or the disclosure of sensitive information. The vulnerable component is the process of embedding the workspace path into the Large Language Model (LLM) prompt.
Recommendations
Update OpenClaw to version 2026.2.15 or later.
Exploit
Fix
Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Openclaw