Untriaged
Permalink
CVE-2026-32913
9.3 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): LOW
- Availability impact (A): NONE
OpenClaw < 2026.3.7 - Custom Authorization Header Leakage via Cross-Origin Redirects
OpenClaw before 2026.3.7 contains an improper header validation vulnerability in fetchWithSsrFGuard that forwards custom authorization headers across cross-origin redirects. Attackers can trigger redirects to different origins to intercept sensitive headers like X-Api-Key and Private-Token intended for the original destination.
References
-
GitHub Security Advisory (GHSA-6mgf-v5j7-45cr) third-party-advisory
-
Patch Commit patch
-
VulnCheck Advisory third-party-advisory
Affected products
OpenClaw
- <2026.3.7
- ==2026.3.7
Package maintainers
-
@chrisportela Chris Portela <chris@chrisportela.com>