Description
Crabbox prior to v0.12.0 contains a privilege escalation vulnerability that allows users with shared visibility-only access to obtain Code, WebVNC, and Egress agent tickets by sending POST requests to ticket endpoints. Attackers can exploit insufficient access control checks on the /v1/leases/:id/code/ticket, /v1/leases/:id/webvnc/ticket, and /v1/leases/:id/egress/ticket endpoints to obtain bridge-agent tickets and impersonate trusted lease-side bridges despite having only visibility permissions.
Published: 2026-05-14
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Crabbox versions prior to 0.12.0 suffer from a privilege escalation flaw that lets any user who has only shared visibility rights acquire agent tickets for Code, WebVNC, and Egress services. By sending unauthenticated POST requests to the /v1/leases/:id/code/ticket, /v1/leases/:id/webvnc/ticket and /v1/leases/:id/egress/ticket endpoints, an attacker can obtain bridge‑agent tickets and impersonate a trusted bridge on the lease side. Because the application does not enforce proper access control on those endpoints, the attacker gains elevated privileges beyond visibility, effectively bypassing the intended permission model. This vulnerability is a classic example of insufficient authorization checks (CWE-639).

Affected Systems

The openclaw:crabbox application is affected. Any deployment of Crabbox earlier than version 0.12.0 is vulnerable. The issue was addressed in release v0.12.0, so versions 0.12.0 and later are considered safe.

Risk and Exploitability

The CVSS score of 8.6 indicates high severity and potential for significant impact. No EPSS score is currently available, but the vulnerability has been publicly documented and exploitability is likely via normal HTTP traffic. Although it is not listed in the CISA KEV catalog, the flaw enables privilege escalation and could be weaponized remotely against exposed instances. Attackers with only visibility permissions can use standard HTTP POST requests to leak privileged tickets, making exploitation straightforward for attackers who can reach the service.

Generated by OpenCVE AI on May 14, 2026 at 20:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Crabbox to version 0.12.0 or newer to obtain the fix that enforces proper authorization on ticket endpoints.
  • Restrict the /v1/leases/:id/... ticket endpoints so that only users with appropriate tenancy or lease-level permissions can access them, for example by implementing ACL checks or network‑level controls.
  • Monitor application logs for unexpected POST requests to ticket endpoints and investigate any that originate from accounts with only visibility permissions.

Generated by OpenCVE AI on May 14, 2026 at 20:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 14 May 2026 21:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Openclaw
Openclaw crabbox
Vendors & Products Openclaw
Openclaw crabbox

Thu, 14 May 2026 19:30:00 +0000

Type Values Removed Values Added
Description Crabbox prior to v0.12.0 contains a privilege escalation vulnerability that allows users with shared visibility-only access to obtain Code, WebVNC, and Egress agent tickets by sending POST requests to ticket endpoints. Attackers can exploit insufficient access control checks on the /v1/leases/:id/code/ticket, /v1/leases/:id/webvnc/ticket, and /v1/leases/:id/egress/ticket endpoints to obtain bridge-agent tickets and impersonate trusted lease-side bridges despite having only visibility permissions.
Title Crabbox < v0.12.0 Privilege Escalation via Agent Ticket Endpoints
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Crabbox
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-14T19:50:08.966Z

Reserved: 2026-05-14T18:50:29.577Z

Link: CVE-2026-8629

cve-icon Vulnrichment

Updated: 2026-05-14T19:49:55.229Z

cve-icon NVD

Status : Deferred

Published: 2026-05-14T20:17:21.567

Modified: 2026-05-15T14:11:05.983

Link: CVE-2026-8629

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T20:45:28Z

Weaknesses