Description
Crabbox prior to v0.12.0 contains an environment variable exposure vulnerability that allows attackers with access to a malicious or compromised repository to forward local secrets such as API tokens, cloud credentials, and broker tokens into the remote command environment. Attackers can exploit overly permissive environment variable allowlisting in repo-local Crabbox configuration to serialize sensitive environment variables into remote command execution, exposing credentials to the remote environment.
Published: 2026-05-14
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability allows an attacker with access to a malicious or compromised repository to exploit an overly permissive environment variable allowlisting in the Crabbox configuration and serialize sensitive local environment variables—such as API tokens, cloud credentials, or broker tokens—into the remote command execution environment. The resulting information disclosure can expose credentials and secret data to the remote execution context, potentially enabling further exploitation such as unauthorized access to cloud resources or remote services. The weakness is classified as CWE‑94, indicating improper control of code generation, because the contaminated environment variables are effectively injected into remote command contexts.

Affected Systems

Systems using the Openclaw Crabbox project that run any version prior to 0.12.0 are affected. The vulnerability exists in all releases of Crabbox from inception up to, but excluding, the 0.12.0 release. No specific operating system or platform is mentioned; the issue is confined to the Crabbox application itself. It is advisable to upgrade any affected Crabbox instance to version 0.12.0 or later to eliminate the risk.

Risk and Exploitability

The CVSS score of 9.3 signals a critical threat, while the EPSS score is presently unavailable, suggesting that the exploitation likelihood has not been quantified. The vulnerability is not listed in the CISA KEV catalog. Attackers typically need the ability to introduce or manipulate repository code that is processed by Crabbox, which can occur if a repository is publicly writable, compromised, or contains malicious content. Once the repository code or configuration is executed, environment variables containing secrets are propagated to the remote command environment, exposing credentials that can be used to gain unauthorized access to external systems or services. Due to the high severity and the simple conditions for exploitation—merely running Crabbox with a malicious or compromised repository—the risk remains high and immediate action is warranted.

Generated by OpenCVE AI on May 14, 2026 at 20:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Crabbox to version 0.12.0 or newer, which closes the environment variable exposure flaw.
  • Review and restrict the environment variable allowlist in the Crabbox configuration to omit any sensitive credentials or unexpected variables before enabling remote command execution.
  • Monitor remote command executions for unexpected environment variable content and enforce the principle of least privilege by disabling remote command execution where not required.

Generated by OpenCVE AI on May 14, 2026 at 20:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 15 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Openclaw
Openclaw crabbox
Vendors & Products Openclaw
Openclaw crabbox

Thu, 14 May 2026 19:30:00 +0000

Type Values Removed Values Added
Description Crabbox prior to v0.12.0 contains an environment variable exposure vulnerability that allows attackers with access to a malicious or compromised repository to forward local secrets such as API tokens, cloud credentials, and broker tokens into the remote command environment. Attackers can exploit overly permissive environment variable allowlisting in repo-local Crabbox configuration to serialize sensitive environment variables into remote command execution, exposing credentials to the remote environment.
Title Crabbox < v0.12.0 Environment Variable Information Disclosure
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Openclaw Crabbox
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-15T14:16:48.770Z

Reserved: 2026-05-14T19:12:45.834Z

Link: CVE-2026-8634

cve-icon Vulnrichment

Updated: 2026-05-15T14:16:42.461Z

cve-icon NVD

Status : Deferred

Published: 2026-05-14T20:17:21.717

Modified: 2026-05-15T15:16:56.913

Link: CVE-2026-8634

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T20:45:28Z

Weaknesses