Skip to content
CVSS 7.3 · HIGH

CVE-2026-7505

A flaw has been found in nextlevelbuilder GoClaw and GoClaw Lite up to 3.8.5. This affects an unknown function of the component RPC Handler. This manipulation causes improper authorization. The attack may be initiated remotely. The exploit has been published and may be used. Upgrading to version 3.9.0 mitigates this issue. Patch name: 406022e79f4a18b3070a446712080571eff11e30. You should upgrade the affected component.

View on NVD

Analysis

GoClaw and GoClaw Lite appear to be niche automation tools with low deployment volume in general dev stacks. While a remote exploit is published for an authorization flaw, the impact is limited to a very small user base and does not pose a systemic risk to the community.

Severity

Score: 7.3(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: LOW
I: LOW
A: LOW
Weakness (CWE): CWE-266CWE-285

EPSS

Probability of exploitation (next 30 days): 0.0006 (0.1%)
Percentile: 17.8%
EPSS: 2026-05-06

Technical description

A flaw has been found in nextlevelbuilder GoClaw and GoClaw Lite up to 3.8.5. This affects an unknown function of the component RPC Handler. This manipulation causes improper authorization. The attack may be initiated remotely. The exploit has been published and may be used. Upgrading to version 3.9.0 mitigates this issue. Patch name: 406022e79f4a18b3070a446712080571eff11e30. You should upgrade the affected component.

Published: 4/30/2026, 11:16:20 PM
Last modified: 5/1/2026, 3:26:24 PM

References

HomeEventsBlogResourcesTeam