Path traversal in config $include resolution allowed arbitrary local file reads outside the config directory boundary (CWE-22).
$include to absolute paths (for example /etc/passwd) and read files accessible to the OpenClaw process.../../...) to escape the config directory.A successful exploit can expose local secrets and credentials readable by the OpenClaw process user, including API keys and private config material.
openclaw (npm)<=2026.2.15>=2026.2.17d1c00dbb7c64a39e205464dae7f2a068420e91c1Patched version is pre-set to 2026.2.17. Once npm release 2026.2.17 is available, this advisory is ready to publish.
OpenClaw thanks @aether-ai-agent for reporting.
{
"nvd_published_at": "2026-03-11T14:16:28Z",
"github_reviewed_at": "2026-03-03T19:57:23Z",
"cwe_ids": [
"CWE-22"
],
"severity": "MODERATE",
"github_reviewed": true
}