Summary
OpenClaw used left-most X-Forwarded-For values when requests came from configured trusted proxies. In proxy chains that append/preserve header values, this could let attacker-controlled header content influence security decisions tied to client IP.
Affected Packages / Versions
- Package:
openclaw (npm)
- Affected:
<= 2026.2.19-2
- Patched:
2026.2.21 (planned next release)
Impact
Possible client-IP spoofing in security-sensitive paths (for example auth rate-limit identity and local/private classification) for deployments behind trusted proxies with non-recommended forwarding behavior.
Scope Note
OpenClaw docs recommend reverse proxies overwrite (not append/preserve) inbound forwarding headers. This condition reduces severity.
Fix Commit(s)
07039dc089e51589a213ec0d16f8d6f2cd871fa1
8877bfd11ec7760b115b2d0d7500a45da2749747
Release Process Note
patched_versions is pre-set to the planned next release (2026.2.21). After npm release is out, publish this advisory.
OpenClaw thanks @AnthonyDiSanti for reporting.