OpenClaw's skills download installer validated the intended per-skill tools root lexically, but later reused that mutable path while downloading and copying the archive into place. If a local attacker could rebind that tools-root path between validation and the final write, the installer could be redirected to write outside the intended tools directory.
The fix pins the canonical per-skill tools root immediately after validation and derives later download/copy paths from that canonical root, so rebinding the lexical path fails closed instead of redirecting the write.
openclaw (npm)2026.3.7<= 2026.3.72026.3.89abf014f3502009faf9c73df5ca2cff719e54639v2026.3.8 published on March 9, 2026.npm view openclaw version resolves to 2026.3.8.v2026.3.8 tree.Thanks @tdjackey for reporting.
{
"cwe_ids": [
"CWE-367"
],
"github_reviewed_at": "2026-03-12T14:21:32Z",
"nvd_published_at": null,
"severity": "MODERATE",
"github_reviewed": true
}