LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-32231

CVE-2026-32231 - Vulnerability Analysis

HighCVSS: 8.2

Last Updated: March 12, 2026

ZeptoClaw - Broken Access Control

Published: March 12, 2026Updated: March 12, 2026Remote Exploitable

Overview

ZeptoClaw < 0.7.6 contains a broken access control vulnerability caused by trusting caller-supplied identity fields in the generic webhook channel, letting attackers spoof sender and chat_id to bypass authorization, exploit requires access to POST /webhook endpoint.

Severity & Score

Severity: High
CVSS Score: 8.2
EPSS Score: 2.3%(Probability of exploitation in next 30 days)

Impact

Attackers can spoof messages and abuse session/chat routing, potentially impersonating users and accessing unauthorized chats.

Mitigation

Update to version 0.7.6 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 12, 2026

🟠 CVE-2026-32231 - High (8.2) ZeptoClaw is a personal AI assistant. Prior to 0.7.6, the generic webhook channel trusts caller-supplied identity fields (sender, chat_id) from the request body and applies authorization checks to those untrusted values. Because authentication is ... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-32231/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-32231
Severity
High
CVSS Score
8.2
Type
broken_access_control
Status
unconfirmed
EPSS
2.3%
Social Posts
1

CWE

  • CWE-306

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

EPSS Score

2.3%Probability of exploitation in the next 30 days