Description
A flaw has been found in nextlevelbuilder GoClaw and GoClaw Lite up to 3.8.5. This affects an unknown function of the component RPC Handler. This manipulation causes improper authorization. The attack may be initiated remotely. The exploit has been published and may be used. Upgrading to version 3.9.0 mitigates this issue. Patch name: 406022e79f4a18b3070a446712080571eff11e30. You should upgrade the affected component.
Problem types
Incorrect Privilege Assignment
Product status
3.8.1
3.8.2
3.8.3
3.8.4
3.8.5
3.9.0
3.8.1
3.8.2
3.8.3
3.8.4
3.8.5
3.9.0
Timeline
| 2026-04-30: | Advisory disclosed |
| 2026-04-30: | VulDB entry created |
| 2026-04-30: | VulDB entry last update |
Credits
AiSec (VulDB User)
References
vuldb.com/vuln/360314 (VDB-360314 | nextlevelbuilder GoClaw/GoClaw Lite RPC improper authorization)
vuldb.com/vuln/360314/cti (VDB-360314 | CTI Indicators (IOB, IOC, TTP))
vuldb.com/submit/803458 (Submit #803458 | Goclaw V0.4.0 Command execution)
github.com/nextlevelbuilder/goclaw/issues/866
github.com/nextlevelbuilder/goclaw/pull/950
github.com/...ommit/406022e79f4a18b3070a446712080571eff11e30
github.com/nextlevelbuilder/goclaw/releases/tag/v3.9.0
github.com/nextlevelbuilder/goclaw/