CVE-2026-45223
HIGH
NVD
CVSS Score
8.8
Severity
HIGH
Published
May 11, 2026
Vendor
unknown
Description
Crabbox before 0.9.0 contains an authentication bypass vulnerability in the coordinator user-token verification path where the verifyUserToken() function fails to reject payloads containing an admin claim, allowing attackers to escalate privileges. An attacker with access to the shared non-admin token can craft a user-token payload with admin: true, sign it using HMAC-SHA256, and present it to admin-only coordinator routes to gain full coordinator admin access including lease visibility, pool state management, and forced release operations.
References
- https://github.com/openclaw/crabbox/commit/46079f6de7f10cf61bc47efebd0c143a41664898
- https://github.com/openclaw/crabbox/pull/64
- https://github.com/openclaw/crabbox/releases/tag/v0.9.0
- https://www.vulncheck.com/advisories/crabbox-authentication-bypass-via-admin-claim-injection
- https://github.com/openclaw/crabbox/pull/64