HIGH SeverityCVSS 4.07.7CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVE-2026-45223
Last updated May 11, 2026 · Published May 11, 2026
Description
Crabbox before 0.9.0 contains an authentication bypass vulnerability in the coordinator user-token verification path where the verifyUserToken() function fails to reject payloads containing an admin claim, allowing attackers to escalate privileges. An attacker with access to the shared non-admin token can craft a user-token payload with admin: true, sign it using HMAC-SHA256, and present it to admin-only coordinator routes to gain full coordinator admin access including lease visibility, pool state management, and forced release operations.
Affected products
1 listed- openclaw:crabbox
Mappings
CWE
CWE-290
CAPEC
None listed.
Related
Guides
CVE® content © MITRE Corporation. Licensed under the CVE Terms of Use. Terms
