<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Header-Injection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/header-injection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 17:17:11 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/header-injection/feed.xml" rel="self" type="application/rss+xml"/><item><title>Plunk Email Platform CRLF Header Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-plunk-crlf/</link><pubDate>Mon, 06 Apr 2026 17:17:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-plunk-crlf/</guid><description>A CRLF header injection vulnerability in Plunk versions prior to 0.8.0 allows authenticated API users to inject arbitrary email headers, enabling silent email forwarding, reply redirection, or sender spoofing.</description><content:encoded><![CDATA[<p>Plunk, an open-source email platform built on top of AWS SES, is vulnerable to CRLF header injection. Prior to version 0.8.0, the application failed to properly sanitize user-supplied values for fields like <code>from.name</code>, <code>subject</code>, custom header keys/values, and attachment filenames. This vulnerability, identified as CVE-2026-34975, allows an authenticated API user to inject arbitrary email headers by including carriage return (<code>\r</code>) and line feed (<code>\n</code>) characters in these fields. Successful exploitation could lead to silent email forwarding to unauthorized recipients, redirection of replies to attacker-controlled addresses, and spoofing of the sender&rsquo;s identity. The vulnerability was addressed in Plunk version 0.8.0 by implementing input validation to reject any of the affected fields containing <code>\r</code> or <code>\n</code> characters. Defenders should ensure Plunk installations are upgraded to version 0.8.0 or later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains authenticated access to the Plunk API.</li>
<li>The attacker crafts a malicious API request to send an email.</li>
<li>In the <code>from.name</code>, <code>subject</code>, custom header keys/values, or attachment filename fields, the attacker injects carriage return (<code>\r</code>) and line feed (<code>\n</code>) characters followed by arbitrary email headers. For example: <code>Subject: legitimate subject\r\nBcc: attacker@example.com</code>.</li>
<li>The Plunk application, prior to version 0.8.0, processes the request without proper sanitization. The injected CRLF sequences are interpreted as header delimiters, and the attacker-supplied headers are added to the email.</li>
<li>The Plunk application constructs a raw MIME message including the injected headers.</li>
<li>Plunk sends the email via AWS SES.</li>
<li>The recipient receives the email, which now includes the attacker-injected headers (e.g., <code>Bcc</code>, <code>Reply-To</code>).</li>
<li>The attacker achieves their objective, such as silently receiving a copy of the email (Bcc), redirecting replies to an attacker-controlled address (Reply-To), or impersonating another sender (From).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the CRLF injection vulnerability (CVE-2026-34975) in Plunk can lead to significant confidentiality and integrity breaches. Attackers can silently intercept sensitive email communications by adding themselves as Bcc recipients. They can also redirect replies to attacker-controlled addresses, potentially gaining access to further information. Furthermore, attackers can spoof the sender&rsquo;s identity, enabling them to conduct phishing attacks or distribute malicious content under the guise of a trusted source. The number of potential victims is proportional to the number of Plunk users and the sensitivity of the information they handle. The risk is particularly high for organizations using Plunk to manage critical communications or sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Plunk to version 0.8.0 or later to remediate CVE-2026-34975, which introduces input validation to prevent CRLF injection.</li>
<li>Monitor Plunk application logs for suspicious API requests containing carriage return (<code>\r</code>) or line feed (<code>\n</code>) characters in email fields. Implement a rule to detect these characters in <code>cs-uri-query</code> within the webserver logs.</li>
<li>Implement input validation on any custom email sending functionality to prevent CRLF injection vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>crlf</category><category>header-injection</category><category>plunk</category><category>cve-2026-34975</category><category>cloud</category></item><item><title>OpenClaw Improper Header Validation Leads to Credential Leakage</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-header-leak/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-header-leak/</guid><description>OpenClaw before 2026.3.7 is vulnerable to improper header validation in fetchWithSsrFGuard, allowing attackers to intercept sensitive authorization headers via cross-origin redirects.</description><content:encoded><![CDATA[<p>OpenClaw, a Node.js framework, is susceptible to a critical vulnerability (CVE-2026-32913) affecting versions prior to 2026.3.7. The vulnerability lies in the <code>fetchWithSsrFGuard</code> function, which improperly validates headers. This flaw allows attackers to potentially forward custom authorization headers, such as <code>X-Api-Key</code> and <code>Private-Token</code>, across cross-origin redirects. Successful exploitation enables the interception of sensitive credentials intended for the original, legitimate destination. The vulnerability was reported in March 2026 and impacts applications using the vulnerable versions of OpenClaw. Defenders should prioritize patching and implementing compensating controls to prevent credential leakage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious URL targeting an OpenClaw application using a version prior to 2026.3.7.</li>
<li>The victim&rsquo;s browser or application requests the malicious URL, including custom authorization headers like <code>X-Api-Key</code> or <code>Private-Token</code>.</li>
<li>The vulnerable <code>fetchWithSsrFGuard</code> function in OpenClaw fails to properly validate or sanitize headers during cross-origin redirects.</li>
<li>The attacker configures their malicious server to respond with an HTTP 302 redirect to a different origin controlled by the attacker.</li>
<li>The victim&rsquo;s client, upon receiving the redirect, unknowingly forwards the sensitive authorization headers to the attacker&rsquo;s server.</li>
<li>The attacker&rsquo;s server logs or captures the leaked <code>X-Api-Key</code> and/or <code>Private-Token</code> values.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to resources or data protected by those credentials on the original target application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32913 can lead to the leakage of sensitive API keys and private tokens. This allows unauthorized access to protected resources, potentially leading to data breaches, account compromise, and other malicious activities. While the specific number of affected applications remains unknown, all OpenClaw deployments prior to version 2026.3.7 are vulnerable. The impact is significant due to the potential for widespread credential compromise across various sectors utilizing OpenClaw for their applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.7 or later to patch CVE-2026-32913 (see references for patch information).</li>
<li>Implement server-side validation to sanitize and strip potentially sensitive authorization headers before following redirects.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Header Forwarding</code> to identify potential exploitation attempts by monitoring for cross-origin redirects involving sensitive headers.</li>
<li>Monitor web server logs for unusual redirect activity and suspicious user agents (see log source information in the Sigma rules).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-32913</category><category>credential-access</category><category>header-injection</category><category>openclaw</category></item></channel></rss>