<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-6635 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-6635/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 20 Apr 2026 12:16:09 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-6635/feed.xml" rel="self" type="application/rss+xml"/><item><title>Rowboatlabs Rowboat Improper Authentication Vulnerability (CVE-2026-6635)</title><link>https://feed.craftedsignal.io/briefs/2026-04-rowboat-auth-bypass/</link><pubDate>Mon, 20 Apr 2026 12:16:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-rowboat-auth-bypass/</guid><description>An improper authentication vulnerability in rowboatlabs rowboat &lt;=0.1.67 allows remote attackers to bypass authentication by manipulating the X-Tools-JWE argument in the tool_call function, potentially leading to unauthorized access and control.</description><content:encoded><![CDATA[<p>A critical security flaw, identified as CVE-2026-6635, has been discovered in rowboatlabs rowboat, specifically in versions up to and including 0.1.67. This vulnerability resides within the <code>tool_call</code> function located in the <code>apps/experimental/tools_webhook/app.py</code> file of the <code>tools_webhook</code> component.  The vulnerability stems from the improper handling of the <code>X-Tools-JWE</code> argument, which can be manipulated by a remote attacker to bypass authentication mechanisms. This flaw allows attackers to potentially gain unauthorized access and execute arbitrary actions within the application. Public exploits are available, increasing the urgency for mitigation. The vendor was notified but has not responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable instance of rowboatlabs rowboat version 0.1.67 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>tool_call</code> function.</li>
<li>Within the HTTP request, the attacker manipulates the <code>X-Tools-JWE</code> argument with a crafted payload designed to bypass authentication checks.</li>
<li>The vulnerable <code>tool_call</code> function fails to properly validate the manipulated <code>X-Tools-JWE</code> argument.</li>
<li>The application grants the attacker unauthorized access based on the bypassed authentication.</li>
<li>The attacker leverages the unauthorized access to execute actions normally restricted to authenticated users.</li>
<li>Depending on the application&rsquo;s functionality, this could involve data exfiltration, modification, or execution of arbitrary code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6635 can lead to complete compromise of the rowboatlabs rowboat application. Attackers can gain unauthorized access to sensitive data, modify application settings, or even execute arbitrary code on the server. Due to the ease of exploitation with public exploits available, all instances of vulnerable rowboat versions are at immediate risk. The specific impact depends on the application&rsquo;s role and the data it handles, but potential consequences include data breaches, service disruption, and financial loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation to <code>X-Tools-JWE</code> argument using <code>tool_call</code> function within <code>apps/experimental/tools_webhook/app.py</code> to prevent improper authentication (CVE-2026-6635).</li>
<li>Deploy the Sigma rule <code>Detect Rowboat Authentication Bypass Attempt via X-Tools-JWE Manipulation</code> to detect exploitation attempts.</li>
<li>Monitor web server logs for HTTP requests targeting the <code>tool_call</code> function with unusual <code>X-Tools-JWE</code> values.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6635</category><category>authentication bypass</category><category>web application</category></item></channel></rss>