OpenClaw MCP Loopback Token Spoofing Vulnerability
A vulnerability in OpenClaw versions 2026.4.21 and earlier allows a non-owner loopback client to spoof the owner context by manipulating request headers, potentially gaining unauthorized access to owner-gated operations.
OpenClaw, a package available on npm, contains a vulnerability in versions 2026.4.21 and earlier that allows for token spoofing within the MCP loopback path. This flaw stems from the acceptance of spoofable owner-context metadata from request headers. A malicious actor could exploit this by crafting requests that falsely present them as the owner, thereby bypassing authorization checks and potentially gaining unauthorized access to operations intended only for the owner. The vulnerability was reported by @VladimirEliTokarev and patched in version 2026.4.22. This issue matters for defenders because it can lead to privilege escalation and unauthorized modification of system configurations or data.
Attack Chain
- Attacker identifies a vulnerable OpenClaw instance (version <= 2026.4.21) utilizing the MCP loopback.
- Attacker crafts a malicious HTTP request targeting the MCP loopback endpoint.
- Attacker injects a forged “sender-owner” header into the HTTP request, claiming owner privileges.
- The vulnerable OpenClaw instance incorrectly trusts the spoofed “sender-owner” header.
- The application bypasses owner authorization checks due to the forged header.
- Attacker gains access to owner-gated operations within the MCP loopback.
- Attacker performs unauthorized actions, such as modifying configurations or accessing sensitive data.
- Attacker maintains unauthorized access, potentially escalating privileges further within the system.
Impact
Successful exploitation of this vulnerability could allow unauthorized access to critical system functions intended only for the owner. This could lead to configuration changes, data breaches, or other malicious activities depending on the specific owner-gated operations exposed within the OpenClaw MCP loopback. The severity depends on the permissions granted to the “owner” context within the application but could be critical.
Recommendation
- Upgrade OpenClaw to version 2026.4.22 or later to remediate the vulnerability as described in the fix commit 3cb1a56bfc9579a0f2336f9cfa12a8a744332a19.
- Implement network monitoring to detect suspicious HTTP requests containing potentially forged “sender-owner” headers targeting MCP loopback endpoints using the Sigma rule
Detect OpenClaw MCP Loopback Owner Spoofing. - Review and audit existing OpenClaw deployments to identify and patch vulnerable instances quickly.
Detection coverage 2
Detect OpenClaw MCP Loopback Owner Spoofing
highDetects HTTP requests with suspicious 'sender-owner' headers targeting MCP loopback endpoints, indicating potential owner spoofing attempts in vulnerable OpenClaw instances.
Detect OpenClaw Version via User-Agent
infoDetects requests from OpenClaw based on user agent strings.
Detection queries are kept inside the platform. Get full rules →