OpenClaw improperly parses X-Forwarded-For behind trusted proxies allows client IP spoofing in security decisions
Moderate severity
GitHub Reviewed
Published
Feb 21, 2026
in
openclaw/openclaw
•
Updated Mar 25, 2026
Description
Published to the GitHub Advisory Database
Mar 3, 2026
Reviewed
Mar 3, 2026
Published by the National Vulnerability Database
Mar 19, 2026
Last updated
Mar 25, 2026
Summary
OpenClaw used left-most
X-Forwarded-Forvalues when requests came from configured trusted proxies. In proxy chains that append/preserve header values, this could let attacker-controlled header content influence security decisions tied to client IP.Affected Packages / Versions
openclaw(npm)<= 2026.2.19-22026.2.21(planned next release)Impact
Possible client-IP spoofing in security-sensitive paths (for example auth rate-limit identity and local/private classification) for deployments behind trusted proxies with non-recommended forwarding behavior.
Scope Note
OpenClaw docs recommend reverse proxies overwrite (not append/preserve) inbound forwarding headers. This condition reduces severity.
Fix Commit(s)
07039dc089e51589a213ec0d16f8d6f2cd871fa18877bfd11ec7760b115b2d0d7500a45da2749747Release Process Note
patched_versionsis pre-set to the planned next release (2026.2.21). After npm release is out, publish this advisory.OpenClaw thanks @AnthonyDiSanti for reporting.
References