CVE-2026-44118
OpenClaw before 2026.4.22 derives loopback MCP owner context from spoofable server-issued bearer tokens in request headers. Non-owner loopback clients can present themselves as owner to bypass owner-gated operations by manipulating the sender-owner header metadata.
View on NVDAnalysis
OpenClaw is an open-source game engine re-implementation for a retro game. This vulnerability involves an authentication bypass via header spoofing, but since the software is a hobbyist game project, it is not relevant to the community's professional web and backend development focus.
Severity
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HCWE-290EPSS
No EPSS score yet (CVE may be too fresh).
Technical description
OpenClaw before 2026.4.22 derives loopback MCP owner context from spoofable server-issued bearer tokens in request headers. Non-owner loopback clients can present themselves as owner to bypass owner-gated operations by manipulating the sender-owner header metadata.