OpenClaw versions prior to 2026.2.12 contain a vulnerability in the BlueBubbles (optional plugin) webhook handler in which it authenticates requests based solely on loopback remoteAddress without validating forwarding headers, allowing bypass of configured webhook passwords. When the gateway operates behind a reverse proxy, unauthenticated remote attackers can inject arbitrary BlueBubbles message and reaction events by reaching the proxy endpoint.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xc7w-v5x6-cc87 | OpenClaw has a webhook auth bypass when gateway is behind a reverse proxy (loopback remoteAddress trust) |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 05 Mar 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenClaw versions prior to 2026.2.12 contain a vulnerability in the BlueBubbles (optional plugin) webhook handler in which it authenticates requests based solely on loopback remoteAddress without validating forwarding headers, allowing bypass of configured webhook passwords. When the gateway operates behind a reverse proxy, unauthenticated remote attackers can inject arbitrary BlueBubbles message and reaction events by reaching the proxy endpoint. | |
| Title | OpenClaw < 2026.2.12 - Webhook Authentication Bypass via Loopback remoteAddress Trust | |
| First Time appeared |
Openclaw
Openclaw openclaw |
|
| Weaknesses | CWE-306 | |
| CPEs | cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Openclaw
Openclaw openclaw |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T22:28:30.665Z
Reserved: 2026-03-04T16:16:15.968Z
Link: CVE-2026-29613
No data.
Status : Received
Published: 2026-03-05T22:16:24.850
Modified: 2026-03-05T22:16:24.850
Link: CVE-2026-29613
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA