banner logoJoin us at RSAC™ 2026 Conference, March 23–March 26 | North Expo, Booth N-5863Join us at RSAC™ 2026, March 23–March 26Learn More
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI Security Portfolio
      Leading the Way in AI-Powered Security Solutions
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      Digital Forensics, IRR & Breach Readiness
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-27001

CVE-2026-27001: Openclaw Openclaw RCE Vulnerability

CVE-2026-27001 is a remote code execution flaw in Openclaw Openclaw that allows prompt injection via unsanitized workspace paths. This post explains its technical details, affected versions, impact, and mitigation steps.

Published: February 27, 2026

CVE-2026-27001 Overview

OpenClaw is a personal AI assistant application. Prior to version 2026.2.15, a critical prompt injection vulnerability existed in how OpenClaw handled workspace directory paths. The application embedded the current working directory (workspace path) into the agent system prompt without proper sanitization, allowing attackers to inject malicious instructions into LLM prompts through specially crafted directory names containing control characters, newlines, or Unicode manipulation markers.

Critical Impact

Attackers can manipulate AI assistant behavior by injecting arbitrary instructions through maliciously named directories, potentially leading to unauthorized actions, data exfiltration, or complete compromise of the AI agent's integrity.

Affected Products

  • OpenClaw versions prior to 2026.2.15
  • OpenClaw Node.js package (all vulnerable versions)
  • Any deployment using unsanitized workspace path embedding in LLM prompts

Discovery Timeline

  • 2026-02-20 - CVE-2026-27001 published to NVD
  • 2026-02-20 - Last updated in NVD database

Technical Details for CVE-2026-27001

Vulnerability Analysis

This vulnerability represents a command injection flaw (CWE-77) specific to LLM-based applications. The core issue stems from OpenClaw's failure to sanitize the workspace path before embedding it into system prompts sent to the language model. When an attacker can influence or create a directory with a maliciously crafted name, they can break the intended prompt structure and inject arbitrary instructions that the AI assistant will interpret as legitimate commands.

The attack leverages Unicode control characters, bidirectional text markers, zero-width characters, and line separators to escape the intended context within the prompt template. This allows an attacker to effectively "speak as the system" to the LLM, bypassing any user-level restrictions or safety guardrails that depend on prompt structure integrity.

Root Cause

The root cause is the lack of input sanitization when embedding runtime-derived strings (specifically the workspace directory path) into LLM prompts. The vulnerable code path directly interpolated the workspace path into the system prompt without filtering dangerous Unicode categories including:

  • Control characters (Unicode category Cc) - includes CR, LF, NUL
  • Format characters (Unicode category Cf) - includes bidirectional markers and zero-width characters
  • Line separators (U+2028) and paragraph separators (U+2029)

These characters can break prompt structure, create visual spoofing, or inject new instruction blocks that appear authoritative to the LLM.

Attack Vector

The attack requires local access to create or rename directories in a location where OpenClaw will be executed. An attacker constructs a directory name containing newline sequences followed by attacker-controlled prompt instructions. When a user runs OpenClaw from within this malicious directory, the injected content becomes part of the system prompt, allowing the attacker to:

  1. Override safety instructions
  2. Inject new behavioral directives
  3. Exfiltrate sensitive information through crafted responses
  4. Manipulate the AI to perform unauthorized actions

The security patch introduces the sanitizeForPromptLiteral function that strips dangerous characters:

typescript
/**
 * Sanitize untrusted strings before embedding them into an LLM prompt.
 *
 * Threat model (OC-19): attacker-controlled directory names (or other runtime strings)
 * that contain newline/control characters can break prompt structure and inject
 * arbitrary instructions.
 *
 * Strategy (Option 3 hardening):
 * - Strip Unicode "control" (Cc) + "format" (Cf) characters (includes CR/LF/NUL, bidi marks, zero-width chars).
 * - Strip explicit line/paragraph separators (Zl/Zp): U+2028/U+2029.
 *
 * Notes:
 * - This is intentionally lossy; it trades edge-case path fidelity for prompt integrity.
 * - If you need lossless representation, escape instead of stripping.
 */
export function sanitizeForPromptLiteral(value: string): string {
  return value.replace(/[\p{Cc}\p{Cf}\\u2028\\u2029]/gu, "");
}

Source: GitHub Commit Details

Detection Methods for CVE-2026-27001

Indicators of Compromise

  • Presence of directories with unusual Unicode characters, newlines, or non-printable characters in their names
  • OpenClaw log files showing system prompts containing unexpected line breaks or instruction patterns
  • AI assistant exhibiting behaviors not aligned with configured system instructions
  • Suspicious directory names containing strings like "ignore previous instructions" or similar prompt injection payloads

Detection Strategies

  • Implement file system monitoring for directory creation events containing Unicode control characters (categories Cc, Cf) or line separators
  • Audit OpenClaw installations for versions prior to 2026.2.15 using package manager queries
  • Deploy endpoint detection rules that flag directory names with embedded newline sequences (U+000A, U+000D, U+2028, U+2029)
  • Review LLM prompt logs for anomalous multi-line patterns or unexpected instruction blocks

Monitoring Recommendations

  • Enable verbose logging in OpenClaw to capture full system prompts for security review
  • Monitor for unusual AI assistant responses that deviate from expected behavior patterns
  • Implement alerting on directory traversal or creation operations in workspace locations containing control characters
  • Conduct periodic audits of directory structures where OpenClaw operates to identify potential injection vectors

How to Mitigate CVE-2026-27001

Immediate Actions Required

  • Upgrade OpenClaw to version 2026.2.15 or later immediately
  • Audit existing workspace directories for suspicious naming patterns containing control characters
  • Review AI assistant activity logs for any signs of prompt injection exploitation
  • Implement file system restrictions preventing directory names with Unicode control characters in OpenClaw workspace locations

Patch Information

The vulnerability is fully addressed in OpenClaw version 2026.2.15. The fix implements comprehensive sanitization for all runtime strings embedded into LLM prompts. The patch is available through the official release and can be obtained from the GitHub Release v2026.2.15.

For technical details on the security fix, refer to the GitHub Security Advisory GHSA-2qj5-gwg2-xwc4.

Workarounds

  • Restrict OpenClaw execution to directories with validated, sanitized names until patching is complete
  • Implement operating system-level controls to prevent creation of directories with Unicode control characters
  • Deploy application-level sandboxing to limit the impact of compromised AI assistant behavior
  • Use read-only file system mounts for workspace directories where possible to prevent attacker directory creation
bash
# Verify OpenClaw version and upgrade if necessary
npm list openclaw
npm update openclaw@2026.2.15

# Scan for suspicious directory names in workspace (Linux/macOS)
find /path/to/workspace -type d -name $'*[\\x00-\\x1f\\x7f]*' -print

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechOpenclaw

  • SeverityHIGH

  • CVSS Score8.6

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-77
  • Technical References
  • GitHub Release v2026.2.15
  • Vendor Resources
  • GitHub Commit Details

  • GitHub Security Advisory GHSA-2qj5-gwg2-xwc4
  • Related CVEs
  • CVE-2026-27487: Openclaw Openclaw RCE Vulnerability

  • CVE-2026-26323: OpenClaw Personal AI Assistant RCE Flaw

  • CVE-2026-26320: OpenClaw macOS Client RCE Vulnerability

  • CVE-2026-25593: OpenClaw AI Assistant RCE Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • English
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use