Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.3
OpenClaw incorrectly handles proxy headers, enabling IP spoofing
GHSA-2rgf-hm63-5qph
Summary
OpenClaw, a software used for security decisions, has a bug that can be exploited by attackers to disguise their IP address. This can lead to unauthorized access or incorrect security measures in certain situations. To fix this issue, update to the latest version of OpenClaw, which is scheduled to be released soon.
What to do
- Update openclaw to version 2026.2.21.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | openclaw | <= 2026.2.19-2 | 2026.2.21 |
Original title
OpenClaw improperly parses X-Forwarded-For behind trusted proxies allows client IP spoofing in security decisions
Original description
### Summary
OpenClaw used left-most `X-Forwarded-For` values when requests came from configured trusted proxies. In proxy chains that append/preserve header values, this could let attacker-controlled header content influence security decisions tied to client IP.
### Affected Packages / Versions
- Package: `openclaw` (npm)
- Affected: `<= 2026.2.19-2`
- Patched: `2026.2.21` (planned next release)
### Impact
Possible client-IP spoofing in security-sensitive paths (for example auth rate-limit identity and local/private classification) for deployments behind trusted proxies with non-recommended forwarding behavior.
### Scope Note
OpenClaw docs recommend reverse proxies overwrite (not append/preserve) inbound forwarding headers. This condition reduces severity.
### Fix Commit(s)
- `07039dc089e51589a213ec0d16f8d6f2cd871fa1`
- `8877bfd11ec7760b115b2d0d7500a45da2749747`
### Release Process Note
`patched_versions` is pre-set to the planned next release (`2026.2.21`). After npm release is out, publish this advisory.
OpenClaw thanks @AnthonyDiSanti for reporting.
OpenClaw used left-most `X-Forwarded-For` values when requests came from configured trusted proxies. In proxy chains that append/preserve header values, this could let attacker-controlled header content influence security decisions tied to client IP.
### Affected Packages / Versions
- Package: `openclaw` (npm)
- Affected: `<= 2026.2.19-2`
- Patched: `2026.2.21` (planned next release)
### Impact
Possible client-IP spoofing in security-sensitive paths (for example auth rate-limit identity and local/private classification) for deployments behind trusted proxies with non-recommended forwarding behavior.
### Scope Note
OpenClaw docs recommend reverse proxies overwrite (not append/preserve) inbound forwarding headers. This condition reduces severity.
### Fix Commit(s)
- `07039dc089e51589a213ec0d16f8d6f2cd871fa1`
- `8877bfd11ec7760b115b2d0d7500a45da2749747`
### Release Process Note
`patched_versions` is pre-set to the planned next release (`2026.2.21`). After npm release is out, publish this advisory.
OpenClaw thanks @AnthonyDiSanti for reporting.
ghsa CVSS4.0
6.3
Vulnerability type
CWE-345
CWE-807
Published: 3 Mar 2026 · Updated: 7 Mar 2026 · First seen: 6 Mar 2026