openclaw had a workspace boundary bypass in workspace-only path validation: when an in-workspace symlink pointed outside the workspace to a non-existent leaf, the first write could pass validation and create the file outside the workspace.
openclaw (npm)<= 2026.2.25>= 2026.2.26 (pre-set for next planned release)2026.2.25The boundary check path resolved aliases in a way that allowed a non-existent out-of-root symlink target to pass the initial validation window. A first write through the guarded workspace path could therefore escape the workspace boundary.
The fix hardens canonical boundary resolution so missing-leaf alias paths are evaluated against canonical containment, while preserving valid in-root aliases. This closes the first-write escape condition without regressing valid in-root alias usage.
46eba86b45e9db05b7b792e914c4fe0de1b40a231aef45bc060b28a0af45a67dc66acd36aef763c9patched_versions is pre-set to the planned next release (2026.2.26). Once npm release 2026.2.26 is published, this advisory can be published directly.
Thanks @tdjackey for reporting.
{
"github_reviewed": true,
"severity": "HIGH",
"cwe_ids": [
"CWE-22",
"CWE-59"
],
"nvd_published_at": null,
"github_reviewed_at": "2026-03-12T14:21:49Z"
}