OpenClaw used left-most X-Forwarded-For values when requests came from configured trusted proxies. In proxy chains that append/preserve header values, this could let attacker-controlled header content influence security decisions tied to client IP.
openclaw (npm)<= 2026.2.19-22026.2.21 (planned next release)Possible client-IP spoofing in security-sensitive paths (for example auth rate-limit identity and local/private classification) for deployments behind trusted proxies with non-recommended forwarding behavior.
OpenClaw docs recommend reverse proxies overwrite (not append/preserve) inbound forwarding headers. This condition reduces severity.
07039dc089e51589a213ec0d16f8d6f2cd871fa18877bfd11ec7760b115b2d0d7500a45da2749747patched_versions is pre-set to the planned next release (2026.2.21). After npm release is out, publish this advisory.
OpenClaw thanks @AnthonyDiSanti for reporting.
{
"github_reviewed_at": "2026-03-03T22:17:12Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-345",
"CWE-807"
],
"nvd_published_at": "2026-03-19T22:16:38Z",
"severity": "MODERATE"
}