Description
Crabbox prior to v0.12.0 contains an authentication bypass vulnerability that allows non-admin shared-token callers to impersonate other owners or organizations by spoofing identity headers. Attackers can inject malicious X-Crabbox-Owner and X-Crabbox-Org headers in requests authenticated with a shared token to bypass authorization checks and access owner/org-scoped lease operations belonging to victim accounts.
Published: 2026-05-14
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability in Crabbox finds that shared-token authentication does not adequately enforce ownership checks when identity headers are present. An attacker who possesses a non‑admin shared token can craft HTTP requests that include X‑Crabbox‑Owner and X‑Crabbox‑Org headers, causing the system to treat the request as belonging to a different owner or organization. This bypasses all authorization checks for lease operations that are scoped to an owner or organization, allowing the attacker to read, modify, or delete resources that belong to the victim account. The weakness is a classic authentication bypass (CWE‑287) that undermines both confidentiality and integrity of lease data.

Affected Systems

This flaw is present in all releases of Crabbox older than version 0.12.0. The affected product is Crabbox, a container management platform produced by OpenClaw. Any instance of Crabbox running with a shared‑token authentication mechanism that predates v0.12.0 is vulnerable; the issue does not exist in releases 0.12.0 and later.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity. EPSS data is not available, so the current exploitation probability is unquantified. The vulnerability is not listed in CISA’s KEV catalog, though the presence of the flaw means that attackers with a shared token can easily compromise the account if they can guess or steal the token. Attackers can perform the exploitation remotely by sending crafted HTTP requests to the Crabbox API, and the attack does not require additional privileges beyond possession of a shared token. Because the flaw is an authentication bypass, the impact can be extensive for any compromised account.

Generated by OpenCVE AI on May 14, 2026 at 20:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Crabbox to version 0.12.0 or later.
  • Audit current shared‑token usage and restrict its scope to the minimum necessary for each account.
  • Implement strict validation on incoming X‑Crabbox‑Owner and X‑Crabbox‑Org headers, rejecting spoofed values when a non‑administrator token is presented.

Generated by OpenCVE AI on May 14, 2026 at 20:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 14 May 2026 21:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Openclaw
Openclaw crabbox
Vendors & Products Openclaw
Openclaw crabbox

Thu, 14 May 2026 19:00:00 +0000

Type Values Removed Values Added
Description Crabbox prior to v0.12.0 contains an authentication bypass vulnerability that allows non-admin shared-token callers to impersonate other owners or organizations by spoofing identity headers. Attackers can inject malicious X-Crabbox-Owner and X-Crabbox-Org headers in requests authenticated with a shared token to bypass authorization checks and access owner/org-scoped lease operations belonging to victim accounts.
Title Crabbox < v0.12.0 Authentication Bypass via Header Spoofing
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Crabbox
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-14T19:50:07.817Z

Reserved: 2026-05-14T18:39:14.316Z

Link: CVE-2026-8621

cve-icon Vulnrichment

Updated: 2026-05-14T19:37:44.738Z

cve-icon NVD

Status : Deferred

Published: 2026-05-14T19:16:39.517

Modified: 2026-05-15T14:11:05.983

Link: CVE-2026-8621

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T20:45:28Z

Weaknesses