Rowboatlabs Rowboat Improper Authentication Vulnerability (CVE-2026-6635)
An improper authentication vulnerability in rowboatlabs rowboat <=0.1.67 allows remote attackers to bypass authentication by manipulating the X-Tools-JWE argument in the tool_call function, potentially leading to unauthorized access and control.
A critical security flaw, identified as CVE-2026-6635, has been discovered in rowboatlabs rowboat, specifically in versions up to and including 0.1.67. This vulnerability resides within the tool_call function located in the apps/experimental/tools_webhook/app.py file of the tools_webhook component. The vulnerability stems from the improper handling of the X-Tools-JWE argument, which can be manipulated by a remote attacker to bypass authentication mechanisms. This flaw allows attackers to potentially gain unauthorized access and execute arbitrary actions within the application. Public exploits are available, increasing the urgency for mitigation. The vendor was notified but has not responded.
Attack Chain
- Attacker identifies a vulnerable instance of rowboatlabs rowboat version 0.1.67 or earlier.
- The attacker crafts a malicious HTTP request targeting the
tool_callfunction. - Within the HTTP request, the attacker manipulates the
X-Tools-JWEargument with a crafted payload designed to bypass authentication checks. - The vulnerable
tool_callfunction fails to properly validate the manipulatedX-Tools-JWEargument. - The application grants the attacker unauthorized access based on the bypassed authentication.
- The attacker leverages the unauthorized access to execute actions normally restricted to authenticated users.
- Depending on the application’s functionality, this could involve data exfiltration, modification, or execution of arbitrary code.
Impact
Successful exploitation of CVE-2026-6635 can lead to complete compromise of the rowboatlabs rowboat application. Attackers can gain unauthorized access to sensitive data, modify application settings, or even execute arbitrary code on the server. Due to the ease of exploitation with public exploits available, all instances of vulnerable rowboat versions are at immediate risk. The specific impact depends on the application’s role and the data it handles, but potential consequences include data breaches, service disruption, and financial loss.
Recommendation
- Apply appropriate input validation to
X-Tools-JWEargument usingtool_callfunction withinapps/experimental/tools_webhook/app.pyto prevent improper authentication (CVE-2026-6635). - Deploy the Sigma rule
Detect Rowboat Authentication Bypass Attempt via X-Tools-JWE Manipulationto detect exploitation attempts. - Monitor web server logs for HTTP requests targeting the
tool_callfunction with unusualX-Tools-JWEvalues.
Detection coverage 2
Detect Rowboat Authentication Bypass Attempt via X-Tools-JWE Manipulation
criticalDetects attempts to exploit CVE-2026-6635 by manipulating the X-Tools-JWE header in requests to the tool_call endpoint.
Detect Rowboat tools_webhook Access Attempt
mediumDetects access to the tools_webhook component in Rowboat, which may indicate exploitation attempts.
Detection queries are kept inside the platform. Get full rules →