Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-46q5-g3j9-wx5c | ZeptoClaw: Generic webhook channel trusts caller-supplied identity fields; allowlist is checked against untrusted payload data |
Fri, 20 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zeptoclaw
Zeptoclaw zeptoclaw |
|
| CPEs | cpe:2.3:a:zeptoclaw:zeptoclaw:*:*:*:*:*:rust:*:* | |
| Vendors & Products |
Zeptoclaw
Zeptoclaw zeptoclaw |
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qhkm
Qhkm zeptoclaw |
|
| Vendors & Products |
Qhkm
Qhkm zeptoclaw |
Thu, 12 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ZeptoClaw is a personal AI assistant. Prior to 0.7.6, the generic webhook channel trusts caller-supplied identity fields (sender, chat_id) from the request body and applies authorization checks to those untrusted values. Because authentication is optional and defaults to disabled (auth_token: None), an attacker who can reach POST /webhook can spoof an allowlisted sender and choose arbitrary chat_id values, enabling high-risk message spoofing and potential IDOR-style session/chat routing abuse. This vulnerability is fixed in 0.7.6. | |
| Title | ZeptoClaw: Generic webhook channel trusts caller-supplied identity fields; allowlist is checked against untrusted payload data | |
| Weaknesses | CWE-306 CWE-345 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-12T20:47:02.636Z
Reserved: 2026-03-11T14:47:05.682Z
Link: CVE-2026-32231
Updated: 2026-03-12T20:44:26.603Z
Status : Analyzed
Published: 2026-03-12T19:16:17.027
Modified: 2026-03-20T16:03:45.183
Link: CVE-2026-32231
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:55:06Z
Github GHSA