๐Ÿ” CVE Alert

CVE-2026-7505

HIGH 7.3

nextlevelbuilder GoClaw/GoClaw Lite RPC improper authorization

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th

A flaw has been found in nextlevelbuilder GoClaw and GoClaw Lite up to 3.8.5. This affects an unknown function of the component RPC Handler. This manipulation causes improper authorization. The attack may be initiated remotely. The exploit has been published and may be used. Upgrading to version 3.9.0 mitigates this issue. Patch name: 406022e79f4a18b3070a446712080571eff11e30. You should upgrade the affected component.

CWE CWE-285 CWE-266
Vendor nextlevelbuilder
Product goclaw
Published Apr 30, 2026
Stay Ahead of the Next One

Get instant alerts for nextlevelbuilder goclaw

Be the first to know when new high vulnerabilities affecting nextlevelbuilder goclaw are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

nextlevelbuilder / GoClaw
3.8.0 3.8.1 3.8.2 3.8.3 3.8.4 3.8.5
nextlevelbuilder / GoClaw Lite
3.8.0 3.8.1 3.8.2 3.8.3 3.8.4 3.8.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/360314 vuldb.com: https://vuldb.com/vuln/360314/cti vuldb.com: https://vuldb.com/submit/803458 github.com: https://github.com/nextlevelbuilder/goclaw/issues/866 github.com: https://github.com/nextlevelbuilder/goclaw/pull/950 github.com: https://github.com/nextlevelbuilder/goclaw/commit/406022e79f4a18b3070a446712080571eff11e30 github.com: https://github.com/nextlevelbuilder/goclaw/releases/tag/v3.9.0 github.com: https://github.com/nextlevelbuilder/goclaw/

Credits

๐Ÿ” AiSec (VulDB User)