CVE-2026-8629 PUBLISHED

Crabbox < v0.12.0 Privilege Escalation via Agent Ticket Endpoints

Assigner: VulnCheck
Reserved: 14.05.2026 Published: 14.05.2026 Updated: 14.05.2026

Crabbox prior to v0.12.0 contains a privilege escalation vulnerability that allows users with shared visibility-only access to obtain Code, WebVNC, and Egress agent tickets by sending POST requests to ticket endpoints. Attackers can exploit insufficient access control checks on the /v1/leases/:id/code/ticket, /v1/leases/:id/webvnc/ticket, and /v1/leases/:id/egress/ticket endpoints to obtain bridge-agent tickets and impersonate trusted lease-side bridges despite having only visibility permissions.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.6

Product Status

Vendor openclaw
Product crabbox
Versions Default: affected
  • affected from 0 to 0.12.0 (excl.)
  • Version 95cb30dc7dbaa1fef690a42ef6ac1cb6e307a191 is unaffected

Credits

  • Chia Min Jun Lennon finder

References

Problem Types

  • CWE-639 Authorization Bypass Through User-Controlled Key CWE