๐Ÿ” CVE Alert

CVE-2026-32231

HIGH 8.2

ZeptoClaw: Generic webhook channel trusts caller-supplied identity fields; allowlist is checked against untrusted payload data

CVSS Score
8.2
EPSS Score
0.0%
EPSS Percentile
0th

ZeptoClaw is a personal AI assistant. Prior to 0.7.6, the generic webhook channel trusts caller-supplied identity fields (sender, chat_id) from the request body and applies authorization checks to those untrusted values. Because authentication is optional and defaults to disabled (auth_token: None), an attacker who can reach POST /webhook can spoof an allowlisted sender and choose arbitrary chat_id values, enabling high-risk message spoofing and potential IDOR-style session/chat routing abuse. This vulnerability is fixed in 0.7.6.

CWE CWE-306 CWE-345
Vendor qhkm
Product zeptoclaw
Published Mar 12, 2026
Last Updated Mar 12, 2026
Stay Ahead of the Next One

Get instant alerts for qhkm zeptoclaw

Be the first to know when new high vulnerabilities affecting qhkm zeptoclaw are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
None

Affected Versions

qhkm / zeptoclaw
< 0.7.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/qhkm/zeptoclaw/security/advisories/GHSA-46q5-g3j9-wx5c github.com: https://github.com/qhkm/zeptoclaw/pull/324 github.com: https://github.com/qhkm/zeptoclaw/commit/bf004a20d3687a0c1a9e052ec79536e30d6de134 github.com: https://github.com/qhkm/zeptoclaw/releases/tag/v0.7.6