CVE-2026-27001
中文标题:
(暂无数据)
英文标题:
OpenClaw: Unsanitized CWD path injection into LLM prompts
漏洞描述
中文描述:
(暂无数据)
英文描述:
OpenClaw is a personal AI assistant. Prior to version 2026.2.15, OpenClaw embedded the current working directory (workspace path) into the agent system prompt without sanitization. If an attacker can cause OpenClaw to run inside a directory whose name contains control/format characters (for example newlines or Unicode bidi/zero-width markers), those characters could break the prompt structure and inject attacker-controlled instructions. Starting in version 2026.2.15, the workspace path is sanitized before it is embedded into any LLM prompt output, stripping Unicode control/format characters and explicit line/paragraph separators. Workspace path resolution also applies the same sanitization as defense-in-depth.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| openclaw | openclaw | < 2026.2.15 | - | - |
cpe:2.3:a:openclaw:openclaw:<_2026.2.15:*:*:*:*:*:*:*
|
| openclaw | openclaw | * | - | - |
cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
CVSS评分详情
4.0 (cna)
HIGHCVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2026-27001 |
2026-02-20 03:19:37 | 2026-02-19 22:00:03 |
| NVD | nvd_CVE-2026-27001 |
2026-02-20 02:00:04 | 2026-02-19 22:00:06 |
版本与语言
安全公告
变更历史
查看详细变更
- affected_products_count: 1 -> 2
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']