Description
OpenClaw before 2026.4.22 derives loopback MCP owner context from spoofable server-issued bearer tokens in request headers. Non-owner loopback clients can present themselves as owner to bypass owner-gated operations by manipulating the sender-owner header metadata.
Problem types
CWE-290: Authentication Bypass by Spoofing
Product status
Any version before 2026.4.22
2026.4.22 (semver)
Credits
vladimir tokarev (@VladimirEliTokarev)
References
github.com/...enclaw/security/advisories/GHSA-r6xh-pqhr-v4xh (GitHub Security Advisory (GHSA-r6xh-pqhr-v4xh))
github.com/...ommit/3cb1a56bfc9579a0f2336f9cfa12a8a744332a19 (Patch Commit)
www.vulncheck.com/...ontext-spoofing-via-bearer-token-header (VulnCheck Advisory: OpenClaw < 2026.4.22 - Owner Context Spoofing via Bearer Token Header)