Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.9

OpenClaw: Malicious Feishu Metadata Can Block Message Processing

GHSA-c6hr-w26q-c636 CVE-2026-22178
Summary

OpenClaw, a software, has a security issue that can cause it to block message processing if it receives specially crafted metadata from Feishu. This is because the software does not properly escape certain characters in the metadata, which can be used to create a denial-of-service attack. To fix this issue, update OpenClaw to version 2026.2.19 or later.

What to do
  • Update steipete openclaw to version 2026.2.19.
Affected software
VendorProductAffected versionsFix available
steipete openclaw <= 2026.2.19 2026.2.19
Original title
OpenClaw versions prior to 2026.2.19 construct RegExp objects directly from unescaped Feishu mention metadata in the stripBotMention function, allowing regex injection and denial of service. Attack...
Original description
OpenClaw versions prior to 2026.2.19 construct RegExp objects directly from unescaped Feishu mention metadata in the stripBotMention function, allowing regex injection and denial of service. Attackers can craft nested-quantifier patterns or metacharacters in mention metadata to trigger catastrophic backtracking, block message processing, or remove unintended content before model processing.
osv CVSS4.0 7.8
Vulnerability type
CWE-1333 Inefficient Regular Expression Complexity (ReDoS)
Published: 18 Mar 2026 · Updated: 18 Mar 2026 · First seen: 18 Mar 2026