Back to VulnFeed / CVE-2026-7505
root@hackertop:~/vulnfeed/CVE-2026-7505#
CVE-2026-7505 MEDIUM CVE ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

nextlevelbuilder GoClaw/GoClaw Lite up to 3.8.5 RPC improper authorization

目标组件 21d ago Impact pending confirmation
LIFECYCLE
6.6 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in nextlevelbuilder GoClaw and GoClaw Lite up to 3.8.5. It has been rated as critical. Affected by this issue is an unknown part of the component RPC Handler. Upgrading to version 3.9.0 eliminates this vulnerability. The upgrade is hosted for download at github.com. Applying the patch 406022e79f4a18b3070a446712080571eff11e30 is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Root Cause Analysis
Using CWE to declare the problem leads to CWE-285. The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.

Impact: Impacted is confidentiality, integrity, and availability.

Exploit: The exploit is available at github.com. It is declared as proof-of-concept.

Countermeasure: Upgrading to version 3.9.0 eliminates this vulnerability. The upgrade is hosted for download at github.com. Applying the patch 406022e79f4a18b3070a446712080571eff11e30 is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-7505 · CVSS 6.6 · Active Threat