CVE-2026-7505
A flaw has been found in nextlevelbuilder GoClaw and GoClaw Lite up to 3.8.5. This affects an unknown function of the component RPC Handler. This manipulation causes improper authorization. The attack may be initiated remotely. The exploit has been published and may be used. Upgrading to version 3.9.0 mitigates this issue. Patch name: 406022e79f4a18b3070a446712080571eff11e30. You should upgrade the affected component.
View on NVDAnalysis
GoClaw and GoClaw Lite appear to be niche automation tools with low deployment volume in general dev stacks. While a remote exploit is published for an authorization flaw, the impact is limited to a very small user base and does not pose a systemic risk to the community.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:LCWE-266CWE-285EPSS
Technical description
A flaw has been found in nextlevelbuilder GoClaw and GoClaw Lite up to 3.8.5. This affects an unknown function of the component RPC Handler. This manipulation causes improper authorization. The attack may be initiated remotely. The exploit has been published and may be used. Upgrading to version 3.9.0 mitigates this issue. Patch name: 406022e79f4a18b3070a446712080571eff11e30. You should upgrade the affected component.
References
- https://github.com/nextlevelbuilder/goclaw/
- https://github.com/nextlevelbuilder/goclaw/commit/406022e79f4a18b3070a446712080571eff11e30
- https://github.com/nextlevelbuilder/goclaw/issues/866
- https://github.com/nextlevelbuilder/goclaw/pull/950
- https://github.com/nextlevelbuilder/goclaw/releases/tag/v3.9.0
- https://vuldb.com/submit/803458
- https://vuldb.com/vuln/360314
- https://vuldb.com/vuln/360314/cti