High severity7.5NVD Advisory· Published Apr 6, 2026· Updated Apr 9, 2026
CVE-2026-35391
CVE-2026-35391
Description
Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, the getClientIP() function in lib/admin/session.ts trusted the first (leftmost) entry of the X-Forwarded-For header, which is fully controlled by the client. An attacker could forge their source IP address to bypass IP-based rate limiting (enabling brute-force attacks against the admin login) or forge audit log entries (making malicious activity appear to originate from arbitrary IP addresses). This vulnerability is fixed in 1.4.11.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/bulwarkmail/webmail/security/advisories/GHSA-7pj2-232x-6698nvdVendor Advisory
News mentions
3- Why Malwarebytes blocks some Yahoo Mail redirectsMalwarebytes Labs · May 14, 2026
- Critrical cPanel flaw mass-exploited in "Sorry" ransomware attacksBleepingComputer · May 2, 2026
- Recovery scammers hit you when you’re down: Here’s how to avoid a second strikeESET WeLiveSecurity · Apr 10, 2026