CVE-2026-35391

Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, the getClientIP() function in lib/admin/session.ts trusted the first (leftmost) entry of the X-Forwarded-For header, which is fully controlled by the client. An attacker could forge their source IP address to bypass IP-based rate limiting (enabling brute-force attacks against the admin login) or forge audit log entries (making malicious activity appear to originate from arbitrary IP addresses). This vulnerability is fixed in 1.4.11.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bulwarkmail:webmail:*:*:*:*:*:*:*:*

History

09 Apr 2026, 20:59

Type Values Removed Values Added
First Time Bulwarkmail webmail
Bulwarkmail
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:bulwarkmail:webmail:*:*:*:*:*:*:*:*
References () https://github.com/bulwarkmail/webmail/security/advisories/GHSA-7pj2-232x-6698 - () https://github.com/bulwarkmail/webmail/security/advisories/GHSA-7pj2-232x-6698 - Vendor Advisory

06 Apr 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-06 21:16

Updated : 2026-04-09 20:59


NVD link : CVE-2026-35391

Mitre link : CVE-2026-35391

CVE.ORG link : CVE-2026-35391


JSON object : View

Products Affected

bulwarkmail

  • webmail
CWE
CWE-348

Use of Less Trusted Source