CVE-2026-7505
nextlevelbuilder GoClaw/GoClaw Lite RPC improper authorization
CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th
A flaw has been found in nextlevelbuilder GoClaw and GoClaw Lite up to 3.8.5. This affects an unknown function of the component RPC Handler. This manipulation causes improper authorization. The attack may be initiated remotely. The exploit has been published and may be used. Upgrading to version 3.9.0 mitigates this issue. Patch name: 406022e79f4a18b3070a446712080571eff11e30. You should upgrade the affected component.
| CWE | CWE-285 CWE-266 |
| Vendor | nextlevelbuilder |
| Product | goclaw |
| Published | Apr 30, 2026 |
Stay Ahead of the Next One
Get instant alerts for nextlevelbuilder goclaw
Be the first to know when new high vulnerabilities affecting nextlevelbuilder goclaw are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
nextlevelbuilder / GoClaw
3.8.0 3.8.1 3.8.2 3.8.3 3.8.4 3.8.5
nextlevelbuilder / GoClaw Lite
3.8.0 3.8.1 3.8.2 3.8.3 3.8.4 3.8.5
References
vuldb.com: https://vuldb.com/vuln/360314 vuldb.com: https://vuldb.com/vuln/360314/cti vuldb.com: https://vuldb.com/submit/803458 github.com: https://github.com/nextlevelbuilder/goclaw/issues/866 github.com: https://github.com/nextlevelbuilder/goclaw/pull/950 github.com: https://github.com/nextlevelbuilder/goclaw/commit/406022e79f4a18b3070a446712080571eff11e30 github.com: https://github.com/nextlevelbuilder/goclaw/releases/tag/v3.9.0 github.com: https://github.com/nextlevelbuilder/goclaw/
Credits
๐ AiSec (VulDB User)