#VU125238 Incorrect Regular Expression in OpenClaw
Published: April 8, 2026
OpenClaw
OpenClaw
Description
The vulnerability allows a remote user to disclose environment variables.
The vulnerability exists due to incorrect regular expression in src/infra/exec-safe-bin-semantics.ts when evaluating operator-approved safe-bin jq programs. A remote user can use the $ENV filter to disclose environment variables.
The jq safe-bin policy blocked explicit env usage but still allowed access to environment data through $ENV.