๐Ÿ” CVE Alert

CVE-2026-8621

HIGH 8.8

Crabbox < v0.12.0 Authentication Bypass via Header Spoofing

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

Crabbox prior to v0.12.0 contains an authentication bypass vulnerability that allows non-admin shared-token callers to impersonate other owners or organizations by spoofing identity headers. Attackers can inject malicious X-Crabbox-Owner and X-Crabbox-Org headers in requests authenticated with a shared token to bypass authorization checks and access owner/org-scoped lease operations belonging to victim accounts.

CWE CWE-287
Vendor openclaw
Product crabbox
Published May 14, 2026
Last Updated May 14, 2026
Stay Ahead of the Next One

Get instant alerts for openclaw crabbox

Be the first to know when new high vulnerabilities affecting openclaw crabbox are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

openclaw / crabbox
0 < 0.12.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openclaw/crabbox/releases/tag/v0.12.0 github.com: https://github.com/openclaw/crabbox/pull/70 github.com: https://github.com/openclaw/crabbox/commit/b657323f1d1c954cefc8444571fa6c45a8896e7f vulncheck.com: https://www.vulncheck.com/advisories/crabbox-authentication-bypass-via-header-spoofing

Credits

Chia Min Jun Lennon