Impact
OpenClaw versions prior to 2026.2.19 construct RegExp objects directly from unescaped Feishu mention metadata in the stripBotMention function, a flaw that allows regex injection and catastrophic backtracking. This violation of input validation (CWE‑1333) can enable an attacker to craft nested‑quantifier patterns or special characters in mention metadata, causing message processing to hang or remove unintended content before the message is handled by the model, resulting in a denial of service and potential content corruption.
Affected Systems
All instances of OpenClaw:OpenClaw running any releases older than 2026.2.19 are affected; the vulnerability applies to the node.js implementation listed in the CPE.
Risk and Exploitability
The CVSS v3.1 score of 6.9 shows medium severity, and the vulnerability can be triggered remotely through maliciously crafted messages containing exploitative mention metadata. EPSS data is not available and the issue is not currently listed in CISA’s KEV catalog, but the trivial exploitation prerequisites (any message source) give it a high likelihood of abuse if left unpatched.
OpenCVE Enrichment
Github GHSA