CVE-2026-32231
Authorization Bypass in ZeptoClaw Webhook Enables Message Spoofing
Publication date: 2026-03-12
Last updated on: 2026-03-20
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| zeptoclaw | zeptoclaw | to 0.7.5 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
| CWE-345 | The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': "CVE-2026-32231 affects the ZeptoClaw AI assistant's generic webhook channel prior to version 0.7.6. The vulnerability arises because the webhook channel trusts identity fields such as 'sender' and 'chat_id' supplied by the caller in the request body without proper authentication or verification."}, {'type': 'paragraph', 'content': 'Authentication is optional and disabled by default, allowing an attacker who can send POST requests to the /webhook endpoint to spoof an allowlisted sender and specify arbitrary chat IDs. This enables high-risk message spoofing and Insecure Direct Object Reference (IDOR)-style session or chat routing abuse.'}, {'type': 'paragraph', 'content': 'Because the system treats user-provided JSON identity as authoritative, attackers can bypass allowlist restrictions, cause cross-chat or session contamination, hijack sessions, and trigger unauthorized downstream actions by injecting malicious messages.'}, {'type': 'paragraph', 'content': 'The vulnerability is fixed in ZeptoClaw version 0.7.6 by enforcing proper authentication and validation of identity fields.'}] [1]
How can this vulnerability impact me? :
This vulnerability can have significant security impacts including unauthorized message spoofing and session hijacking within the ZeptoClaw AI assistant.
- Attackers can spoof trusted sender identities listed in the allowlist.
- Attackers can specify arbitrary chat IDs, enabling IDOR-style manipulation of sessions or chat routing.
- Bypassing allowlist restrictions can lead to cross-chat or session contamination and hijacking.
- Unauthorized downstream actions can be triggered by injecting malicious messages.
The vulnerability has a high severity with a CVSS v3.1 base score of 8.2, indicating a network attack vector, low attack complexity, no required privileges or user interaction, low confidentiality impact, high integrity impact, and no availability impact.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for unauthorized or spoofed POST requests to the /webhook endpoint that include forged sender and chat_id fields in the JSON request body. Since the vulnerability involves the webhook channel trusting caller-supplied identity fields without proper authentication, detection involves identifying requests that bypass authentication or use unexpected sender/chat_id values.'}, {'type': 'paragraph', 'content': 'Commands to detect potential exploitation attempts could include inspecting web server logs or network traffic for POST requests to /webhook with suspicious payloads. For example, using tools like curl or tcpdump to capture and analyze such requests.'}, {'type': 'list_item', 'content': 'Use curl to simulate or detect unauthorized webhook POST requests: curl -X POST https://yourserver/webhook -d \'{"sender":"trusted-user-1","chat_id":"arbitrary-id"}\' -H \'Content-Type: application/json\''}, {'type': 'list_item', 'content': "Use tcpdump or Wireshark to monitor network traffic for POST requests to /webhook endpoint: tcpdump -i any -A 'tcp port 80 or tcp port 443 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)'"}, {'type': 'list_item', 'content': 'Check application logs for entries where the sender or chat_id fields do not match expected authenticated users or sessions.'}, {'type': 'paragraph', 'content': 'Note that detection is more effective if authentication is enabled and logs include identity verification details. Without authentication, it may be difficult to distinguish legitimate from spoofed requests purely by network or log inspection.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
The primary immediate mitigation step is to upgrade ZeptoClaw to version 0.7.6 or later, where this vulnerability is fixed by enforcing proper authentication and validation of identity fields in webhook channels.
If upgrading immediately is not possible, the following steps can help mitigate risk:
- Enable authentication on the generic webhook channel by configuring a non-null auth_token or enabling HMAC-SHA256 signature verification to ensure requests are properly authenticated.
- Restrict network access to the /webhook endpoint to trusted sources only, for example by firewall rules or network segmentation.
- Avoid exposing the webhook endpoint on public interfaces without authentication.
- Review and tighten allowlist configurations to avoid relying on caller-supplied identity fields and prefer server-controlled identity resolution.
- Monitor logs and network traffic for suspicious POST requests to the webhook endpoint as an additional detection and response measure.
These mitigations reduce the risk of message spoofing, session hijacking, and unauthorized downstream actions until the fixed version can be deployed.