CVE-2026-8621
HIGHCrabbox < v0.12.0 Authentication Bypass via Header Spoofing
Title source: cnaDescription
Crabbox prior to v0.12.0 contains an authentication bypass vulnerability that allows non-admin shared-token callers to impersonate other owners or organizations by spoofing identity headers. Attackers can inject malicious X-Crabbox-Owner and X-Crabbox-Org headers in requests authenticated with a shared token to bypass authorization checks and access owner/org-scoped lease operations belonging to victim accounts.
References (4)
Core 4
Core References
Release Notes release-notes
https://github.com/openclaw/crabbox/releases/tag/v0.12.0
Issue Tracking issue-tracking
https://github.com/openclaw/crabbox/pull/70
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/crabbox-authentication-bypass-via-header-spoofing
Scores
CVSS v3
8.8
EPSS
0.0008
EPSS Percentile
23.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-287
Status
published
Products (3)
openclaw/crabbox
< 0.12.0
openclaw/crabbox
0 - 0.12.0Go
openclaw/crabbox
b657323f1d1c954cefc8444571fa6c45a8896e7f
Published
May 14, 2026
Tracked Since
May 15, 2026