Back to VulnFeed / CVE-2026-45223
root@hackertop:~/vulnfeed/CVE-2026-45223#
CVE-2026-45223 HIGH CVE ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

openclaw crabbox up to 0.8.x verifyUserToken authentication spoofing

crabbox 9d ago Impact pending confirmation
LIFECYCLE
7.4 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in openclaw crabbox up to 0.8.x (Artificial Intelligence Software). It has been rated as critical. This issue affects the function verifyUserToken. Upgrading to version 0.9.0 eliminates this vulnerability. Applying the patch 46079f6de7f10cf61bc47efebd0c143a41664898 is able to eliminate this problem. The best possible mitigation is suggested to be upgrading to the latest version.
Root Cause Analysis
Using CWE to declare the problem leads to CWE-290. This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.

Impact: Impacted is confidentiality, integrity, and availability.

Countermeasure: Upgrading to version 0.9.0 eliminates this vulnerability. Applying the patch 46079f6de7f10cf61bc47efebd0c143a41664898 is able to eliminate this problem. The best possible mitigation is suggested to be upgrading to the latest version.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-45223 · CVSS 7.4 · Active Threat