CVE-2026-32029

MEDIUM

OpenClaw < 2026.2.21 - Client IP Spoofing via X-Forwarded-For Header Parsing

Title source: cna

Description

OpenClaw versions prior to 2026.2.21 improperly parse the left-most X-Forwarded-For header value when requests originate from configured trusted proxies, allowing attackers to spoof client IP addresses. In proxy chains that append or preserve header values, attackers can inject malicious header content to influence security decisions including authentication rate-limiting and IP-based access controls.

Scores

CVSS v3 5.3
EPSS 0.0004
EPSS Percentile 10.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Details

CWE
CWE-345
Status published
Products (4)
npm/openclaw 0 - 2026.2.21npm
OpenClaw/OpenClaw < 2026.2.21
openclaw/openclaw < 2026.2.21
OpenClaw/OpenClaw 2026.2.21
Published Mar 19, 2026
Tracked Since Mar 20, 2026