Impact
The vulnerability is introduced by improper authentication in the tool_call function of apps/experimental/tools_webhook/app.py, where manipulation of the X-Tools-JWE HTTP header allows an attacker to bypass authentication. This authentication flaw can enable unauthorized parties to invoke the tool_call endpoint and potentially execute arbitrary code or operations that should be restricted. The weakness is classified as CWE-287 and exposes both confidentiality and integrity risks for systems relying on the RowBoat tools_webhook component.
Affected Systems
RowBoat Laboratories' RowBoat is affected up to version 0.1.67. Any deployment of RowBoat that includes the tools_webhook component and does not apply the latest fixes could be vulnerable. Because the CVE states the flaw exists in "rowboat up to 0.1.67", older releases are included while newer releases are presumed patched. Administrators should verify the exact version installed and consult RowBoat release notes for a fix.
Risk and Exploitability
The CVSS score of 6.9 indicates a moderate severity. The vulnerability can be exploited remotely, as it does not require local or authenticated access. EPSS data is unavailable, so the current exploitation likelihood is unclear, but the publicly disclosed exploit demonstrates that attacks are feasible. The CVE is not listed in CISA’s KEV catalog, but the presence of a public exploit warrants timely mitigation. The attack vector is presumably HTTP, where an attacker sends a crafted X-Tools-JWE header to gain unauthorized access.
OpenCVE Enrichment