Description
OpenClaw versions prior to 2026.2.19 construct RegExp objects directly from unescaped Feishu mention metadata in the stripBotMention function, allowing regex injection and denial of service. Attackers can craft nested-quantifier patterns or metacharacters in mention metadata to trigger catastrophic backtracking, block message processing, or remove unintended content before model processing.
Problem types
Product status
Any version before 2026.2.19
2026.2.19 (semver)
Credits
Sean Nejad (@allsmog)
References
github.com/...enclaw/security/advisories/GHSA-c6hr-w26q-c636 (GitHub Security Advisory (GHSA-c6hr-w26q-c636))
github.com/...ommit/7e67ab75cc2f0e93569d12fecd1411c2961fcc8c (Patch Commit #1)
github.com/...ommit/74268489137510b6f6349919d1e197b17290d92c (Patch Commit #2)
www.vulncheck.com/...n-via-unescaped-feishu-mention-metadata (VulnCheck Advisory: OpenClaw < 2026.2.19 - ReDoS and Regex Injection via Unescaped Feishu Mention Metadata)