Description
Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, the getClientIP() function in lib/admin/session.ts trusted the first (leftmost) entry of the X-Forwarded-For header, which is fully controlled by the client. An attacker could forge their source IP address to bypass IP-based rate limiting (enabling brute-force attacks against the admin login) or forge audit log entries (making malicious activity appear to originate from arbitrary IP addresses). This vulnerability is fixed in 1.4.11.
Published: 2026-04-06
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: IP spoofing enabling brute‑force and audit log forgery
Action: Immediate Patch
AI Analysis

Impact

This vulnerability arises from the getClientIP() function incorrectly trusting the first leftmost entry of the X-Forwarded-For header, which an attacker can control. By forging this value, an attacker can spoof their IP address, causing the system to treat the request as originating from a different IP. This defeats IP‑based rate limiting, allowing brute‑force attempts on the admin login, and allows forging audit log entries so malicious activity appears to come from arbitrary addresses. The weakness is a classic case of improper input validation, mapped to CWE-348.

Affected Systems

The issue affects the self‑hosted Bulwark Webmail client, specifically versions prior to 1.4.11. All deployments of bulwarkmail:webmail using earlier releases are vulnerable until they update to the fixed release. The product is hosted on the Stalwart Mail Server environment but the attacker only needs control of the HTTP client to influence the header.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity, and the EPSS score of less than 1% suggests that the vulnerability has not been widely exploited yet, though it is not listed in the CISA KEV catalog. Exploitation requires only the ability to send HTTP requests with a crafted X-Forwarded-For header; no additional credentials or privileged access are needed. The likely attack vector is via crafted HTTP requests to the webmail interface, as the vulnerability is triggered by a client‑controlled header. If the application is exposed to the internet or behind an untrusted proxy, the vulnerability is practically exploitable, enabling widespread brute‑force and log‑forgery attacks.

Generated by OpenCVE AI on April 9, 2026 at 22:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Bulwark Webmail to version 1.4.11 or later to receive the fix.
  • If an upgrade is not immediately possible, configure any reverse proxies to strip or strictly validate X-Forwarded-For headers and ensure only trusted proxies inject them.
  • Implement or enforce strict IP‑based rate limiting on the admin interface to limit brute‑force attempts, even if attackers spoof IPs.
  • Review audit logs for suspicious or forged entries and consider adding additional logging of client certificates or session identifiers to verify source legitimacy.

Generated by OpenCVE AI on April 9, 2026 at 22:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:bulwarkmail:webmail:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Bulwarkmail
Bulwarkmail webmail
Vendors & Products Bulwarkmail
Bulwarkmail webmail

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, the getClientIP() function in lib/admin/session.ts trusted the first (leftmost) entry of the X-Forwarded-For header, which is fully controlled by the client. An attacker could forge their source IP address to bypass IP-based rate limiting (enabling brute-force attacks against the admin login) or forge audit log entries (making malicious activity appear to originate from arbitrary IP addresses). This vulnerability is fixed in 1.4.11.
Title Bulwark Webmail getClientIP() trusted client-controlled X-Forwarded-For value, enabling rate limit bypass and audit log forgery
Weaknesses CWE-348
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Bulwarkmail Webmail
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T15:09:49.591Z

Reserved: 2026-04-02T17:03:42.074Z

Link: CVE-2026-35391

cve-icon Vulnrichment

Updated: 2026-04-07T14:55:31.436Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T21:16:20.867

Modified: 2026-04-09T20:59:25.443

Link: CVE-2026-35391

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:45:05Z

Weaknesses