<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-8621 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-8621/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 19:18:12 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-8621/feed.xml" rel="self" type="application/rss+xml"/><item><title>Crabbox Authentication Bypass via Header Spoofing (CVE-2026-8621)</title><link>https://feed.craftedsignal.io/briefs/2026-05-crabbox-auth-bypass/</link><pubDate>Thu, 14 May 2026 19:18:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-crabbox-auth-bypass/</guid><description>Crabbox prior to v0.12.0 contains an authentication bypass vulnerability (CVE-2026-8621) that allows non-admin shared-token callers to impersonate other owners or organizations by spoofing identity headers, granting unauthorized access to lease operations.</description><content:encoded><![CDATA[<p>Crabbox, a currently unspecified software, before version v0.12.0, is vulnerable to an authentication bypass. This flaw, identified as CVE-2026-8621, allows attackers using non-admin shared tokens to impersonate other owners or organizations. By injecting malicious <code>X-Crabbox-Owner</code> and <code>X-Crabbox-Org</code> headers, attackers can bypass authorization checks. This vulnerability was reported on May 14, 2026, and it impacts any Crabbox installations running versions prior to the fix in v0.12.0. Successful exploitation allows unauthorized access to owner/org-scoped lease operations belonging to victim accounts, leading to potential data breaches or service disruption.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker obtains a non-admin shared token for a Crabbox instance prior to v0.12.0.</li>
<li>Attacker crafts a malicious HTTP request targeting owner/org-scoped lease operations.</li>
<li>The attacker injects <code>X-Crabbox-Owner</code> and <code>X-Crabbox-Org</code> headers into the HTTP request, spoofing the identity of a victim owner or organization.</li>
<li>The attacker authenticates the request using the compromised shared token.</li>
<li>Crabbox fails to properly validate the injected headers against the authenticated token.</li>
<li>The authorization check is bypassed due to the spoofed identity headers.</li>
<li>The attacker gains unauthorized access to the victim&rsquo;s owner/org-scoped lease operations.</li>
<li>The attacker performs malicious actions, such as modifying or deleting lease information, potentially leading to data loss or service disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-8621 allows unauthorized access to sensitive lease operations within the Crabbox system. This can result in data breaches, data manipulation, or service disruption depending on the specific functions exposed and the scope of the lease operations. While the specific number of potential victims is unknown, any organization using Crabbox versions prior to v0.12.0 with shared token authentication enabled is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Crabbox to version v0.12.0 or later to patch CVE-2026-8621 (reference: <a href="https://github.com/openclaw/crabbox/releases/tag/v0.12.0">https://github.com/openclaw/crabbox/releases/tag/v0.12.0</a>).</li>
<li>Deploy the Sigma rule &ldquo;Detect Crabbox Authentication Bypass Attempt via Spoofed Headers&rdquo; to identify exploitation attempts by monitoring for the presence of <code>X-Crabbox-Owner</code> and <code>X-Crabbox-Org</code> headers in requests.</li>
<li>Review and restrict the usage of shared tokens in Crabbox to minimize the attack surface.</li>
<li>Implement input validation on the <code>X-Crabbox-Owner</code> and <code>X-Crabbox-Org</code> headers if shared tokens are required, ensuring they match the authenticated user&rsquo;s expected identity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication-bypass</category><category>header-spoofing</category><category>cve-2026-8621</category></item></channel></rss>