Home

Description

Crabbox before 0.9.0 contains an authentication bypass vulnerability in the coordinator user-token verification path where the verifyUserToken() function fails to reject payloads containing an admin claim, allowing attackers to escalate privileges. An attacker with access to the shared non-admin token can craft a user-token payload with admin: true, sign it using HMAC-SHA256, and present it to admin-only coordinator routes to gain full coordinator admin access including lease visibility, pool state management, and forced release operations.

PUBLISHED Reserved 2026-05-11 | Published 2026-05-11 | Updated 2026-05-11 | Assigner VulnCheck




HIGH: 7.7CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Authentication Bypass by Spoofing

Product status

Default status
affected

Any version before 0.9.0
affected

46079f6de7f10cf61bc47efebd0c143a41664898 (git)
unaffected

Credits

Chia Min Jun Lennon finder

References

github.com/openclaw/crabbox/pull/64 exploit

github.com/openclaw/crabbox/releases/tag/v0.9.0 release-notes

github.com/openclaw/crabbox/pull/64 issue-tracking

github.com/...ommit/46079f6de7f10cf61bc47efebd0c143a41664898 patch

www.vulncheck.com/...cation-bypass-via-admin-claim-injection third-party-advisory

cve.org (CVE-2026-45223)

nvd.nist.gov (CVE-2026-45223)

Download JSON