๐Ÿ” CVE Alert

CVE-2026-35391

UNKNOWN 0.0

Bulwark Webmail getClientIP() trusted client-controlled X-Forwarded-For value, enabling rate limit bypass and audit log forgery

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
5th

Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, the getClientIP() function in lib/admin/session.ts trusted the first (leftmost) entry of the X-Forwarded-For header, which is fully controlled by the client. An attacker could forge their source IP address to bypass IP-based rate limiting (enabling brute-force attacks against the admin login) or forge audit log entries (making malicious activity appear to originate from arbitrary IP addresses). This vulnerability is fixed in 1.4.11.

CWE CWE-348
Vendor bulwarkmail
Product webmail
Published Apr 6, 2026
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for bulwarkmail webmail

Be the first to know when new unknown vulnerabilities affecting bulwarkmail webmail are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

bulwarkmail / webmail
< 1.4.11

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/bulwarkmail/webmail/security/advisories/GHSA-7pj2-232x-6698