{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2026-32913/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["cve-2026-32913","credential-access","header-injection","openclaw"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eOpenClaw, a Node.js framework, is susceptible to a critical vulnerability (CVE-2026-32913) affecting versions prior to 2026.3.7. The vulnerability lies in the \u003ccode\u003efetchWithSsrFGuard\u003c/code\u003e function, which improperly validates headers. This flaw allows attackers to potentially forward custom authorization headers, such as \u003ccode\u003eX-Api-Key\u003c/code\u003e and \u003ccode\u003ePrivate-Token\u003c/code\u003e, across cross-origin redirects. Successful exploitation enables the interception of sensitive credentials intended for the original, legitimate destination. The vulnerability was reported in March 2026 and impacts applications using the vulnerable versions of OpenClaw. Defenders should prioritize patching and implementing compensating controls to prevent credential leakage.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eAn attacker crafts a malicious URL targeting an OpenClaw application using a version prior to 2026.3.7.\u003c/li\u003e\n\u003cli\u003eThe victim\u0026rsquo;s browser or application requests the malicious URL, including custom authorization headers like \u003ccode\u003eX-Api-Key\u003c/code\u003e or \u003ccode\u003ePrivate-Token\u003c/code\u003e.\u003c/li\u003e\n\u003cli\u003eThe vulnerable \u003ccode\u003efetchWithSsrFGuard\u003c/code\u003e function in OpenClaw fails to properly validate or sanitize headers during cross-origin redirects.\u003c/li\u003e\n\u003cli\u003eThe attacker configures their malicious server to respond with an HTTP 302 redirect to a different origin controlled by the attacker.\u003c/li\u003e\n\u003cli\u003eThe victim\u0026rsquo;s client, upon receiving the redirect, unknowingly forwards the sensitive authorization headers to the attacker\u0026rsquo;s server.\u003c/li\u003e\n\u003cli\u003eThe attacker\u0026rsquo;s server logs or captures the leaked \u003ccode\u003eX-Api-Key\u003c/code\u003e and/or \u003ccode\u003ePrivate-Token\u003c/code\u003e values.\u003c/li\u003e\n\u003cli\u003eThe attacker uses the stolen credentials to gain unauthorized access to resources or data protected by those credentials on the original target application.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of CVE-2026-32913 can lead to the leakage of sensitive API keys and private tokens. This allows unauthorized access to protected resources, potentially leading to data breaches, account compromise, and other malicious activities. While the specific number of affected applications remains unknown, all OpenClaw deployments prior to version 2026.3.7 are vulnerable. The impact is significant due to the potential for widespread credential compromise across various sectors utilizing OpenClaw for their applications.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eUpgrade OpenClaw to version 2026.3.7 or later to patch CVE-2026-32913 (see references for patch information).\u003c/li\u003e\n\u003cli\u003eImplement server-side validation to sanitize and strip potentially sensitive authorization headers before following redirects.\u003c/li\u003e\n\u003cli\u003eDeploy the Sigma rule \u003ccode\u003eDetect Suspicious Header Forwarding\u003c/code\u003e to identify potential exploitation attempts by monitoring for cross-origin redirects involving sensitive headers.\u003c/li\u003e\n\u003cli\u003eMonitor web server logs for unusual redirect activity and suspicious user agents (see log source information in the Sigma rules).\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-03-24T12:00:00Z","date_published":"2026-03-24T12:00:00Z","id":"/briefs/2026-03-openclaw-header-leak/","summary":"OpenClaw before 2026.3.7 is vulnerable to improper header validation in fetchWithSsrFGuard, allowing attackers to intercept sensitive authorization headers via cross-origin redirects.","title":"OpenClaw Improper Header Validation Leads to Credential Leakage","url":"https://feed.craftedsignal.io/briefs/2026-03-openclaw-header-leak/"}],"language":"en","title":"CraftedSignal Threat Feed — Cve-2026-32913","version":"https://jsonfeed.org/version/1.1"}