CVE-2026-8629
HIGHCrabbox < v0.12.0 Privilege Escalation via Agent Ticket Endpoints
Title source: cnaDescription
Crabbox prior to v0.12.0 contains a privilege escalation vulnerability that allows users with shared visibility-only access to obtain Code, WebVNC, and Egress agent tickets by sending POST requests to ticket endpoints. Attackers can exploit insufficient access control checks on the /v1/leases/:id/code/ticket, /v1/leases/:id/webvnc/ticket, and /v1/leases/:id/egress/ticket endpoints to obtain bridge-agent tickets and impersonate trusted lease-side bridges despite having only visibility permissions.
References (4)
Core 4
Core References
Release Notes release-notes
https://github.com/openclaw/crabbox/releases/tag/v0.12.0
Issue Tracking issue-tracking
https://github.com/openclaw/crabbox/pull/71
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/crabbox-privilege-escalation-via-agent-ticket-endpoints
Scores
CVSS v3
8.1
EPSS
0.0002
EPSS Percentile
6.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-639
Status
published
Products (2)
openclaw/crabbox
< 0.12.0
openclaw/crabbox
95cb30dc7dbaa1fef690a42ef6ac1cb6e307a191
Published
May 14, 2026
Tracked Since
May 15, 2026