CVE-2026-7505

medium

Description

A flaw has been found in nextlevelbuilder GoClaw and GoClaw Lite up to 3.8.5. This affects an unknown function of the component RPC Handler. This manipulation causes improper authorization. The attack may be initiated remotely. The exploit has been published and may be used. Upgrading to version 3.9.0 mitigates this issue. Patch name: 406022e79f4a18b3070a446712080571eff11e30. You should upgrade the affected component.

References

https://vuldb.com/vuln/360314/cti

https://vuldb.com/vuln/360314

https://vuldb.com/submit/803458

https://github.com/nextlevelbuilder/goclaw/releases/tag/v3.9.0

https://github.com/nextlevelbuilder/goclaw/pull/950

https://github.com/nextlevelbuilder/goclaw/issues/866

https://github.com/nextlevelbuilder/goclaw/commit/406022e79f4a18b3070a446712080571eff11e30

https://github.com/nextlevelbuilder/goclaw/

Details

Source: Mitre, NVD

Published: 2026-04-30

Updated: 2026-05-01

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 7.3

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Severity: High

CVSS v4

Base Score: 6.9

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Severity: Medium

EPSS

EPSS: 0.00044