OpenClaw before 2026.3.7 contains an improper header validation vulnerability in fetchWithSsrFGuard that forwards custom authorization headers across cross-origin redirects. Attackers can trigger redirects to different origins to intercept sensitive headers like X-Api-Key and Private-Token intended for the original destination.
References
Configurations
History
24 Mar 2026, 18:01
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openclaw/openclaw/commit/46715371b0612a6f9114dffd1466941ac476cef5 - Patch | |
| References | () https://github.com/openclaw/openclaw/security/advisories/GHSA-6mgf-v5j7-45cr - Vendor Advisory | |
| References | () https://vulncheck.com/advisories/openclaw-mar-custom-authorization-header-leakage-via-cross-origin-redirects - Third Party Advisory | |
| CPE | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Summary |
|
|
| First Time |
Openclaw openclaw
Openclaw |
23 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-23 22:16
Updated : 2026-03-24 18:01
NVD link : CVE-2026-32913
Mitre link : CVE-2026-32913
CVE.ORG link : CVE-2026-32913
JSON object : View
Products Affected
openclaw
- openclaw
CWE
CWE-522
Insufficiently Protected Credentials
