CVE-2026-32231: ZeptoClaw: Generic webhook channel trusts caller-supplied identity fields; allowlist is checked against untrusted payload data
The generic webhook channel trusts caller-supplied identity fields (sender, chat_id) from the request body and applies authorization checks to those untrusted values. Because authentication is optional and defaults to disabled (auth_token: None), an attacker who can reach POST /webhook can spoof an allowlisted sender and choose arbitrary chat_id values, enabling high-risk message spoofing and potential IDOR-style session/chat routing abuse.
References
- github.com/advisories/GHSA-46q5-g3j9-wx5c
- github.com/qhkm/zeptoclaw
- github.com/qhkm/zeptoclaw/commit/bf004a20d3687a0c1a9e052ec79536e30d6de134
- github.com/qhkm/zeptoclaw/pull/324
- github.com/qhkm/zeptoclaw/releases/tag/v0.7.6
- github.com/qhkm/zeptoclaw/security/advisories/GHSA-46q5-g3j9-wx5c
- nvd.nist.gov/vuln/detail/CVE-2026-32231
Code Behaviors & Features
Detect and mitigate CVE-2026-32231 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →