PT-2026-26410 · Openclaw · Openclaw
Anthony Disanti
+1
·
Published
2026-03-19
·
Updated
2026-03-19
·
CVE-2026-32029
CVSS v3.1
3.7
Low
| AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N |
OpenClaw versions prior to 2026.2.21 improperly parse the left-most X-Forwarded-For header value when requests originate from configured trusted proxies, allowing attackers to spoof client IP addresses. In proxy chains that append or preserve header values, attackers can inject malicious header content to influence security decisions including authentication rate-limiting and IP-based access controls.
Fix
Insufficient Verification of Data Authenticity
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Openclaw