CVE-2026-8629: Crabbox Privilege Escalation Puts Shared Environments at Risk
The National Vulnerability Database has detailed CVE-2026-8629, a high-severity privilege escalation vulnerability in Crabbox versions prior to v0.12.0. This flaw allows users with only visibility access to obtain critical agent tickets for Code, WebVNC, and Egress functionalities. The root cause lies in insufficient access control checks on specific ticket endpoints, enabling attackers to impersonate trusted lease-side bridges.
Attackers can exploit this by sending crafted POST requests to /v1/leases/:id/code/ticket, /v1/leases/:id/webvnc/ticket, and /v1/leases/:id/egress/ticket. Despite their limited permissions, successful exploitation grants them bridge-agent tickets, effectively elevating their privileges. This vulnerability is rated 8.1 (HIGH) on the CVSS scale, underscoring the significant risk of unauthorized access and potential control over affected systems.
This isn’t just a theoretical vulnerability; it’s a direct path to deeper compromise. For environments relying on Crabbox for secure, segmented access, this flaw completely undermines the principle of least privilege. Defenders need to recognize that an attacker gaining these tickets isn’t just seeing data — they’re gaining the keys to manipulate and exfiltrate information, or establish persistent access, bypassing carefully constructed access controls.
What This Means For You
- If your organization uses Crabbox, you must immediately patch to v0.12.0 or later to mitigate CVE-2026-8629. Review your access logs for any anomalous POST requests to the `/v1/leases/:id/code/ticket`, `/v1/leases/:id/webvnc/ticket`, and `/v1/leases/:id/egress/ticket` endpoints from users with limited visibility permissions. This is a critical privilege escalation that can lead to full system compromise.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-8629: Crabbox Privilege Escalation via Ticket Endpoint Access
title: CVE-2026-8629: Crabbox Privilege Escalation via Ticket Endpoint Access
id: scw-2026-05-14-ai-1
status: experimental
level: critical
description: |
Detects POST requests to specific Crabbox ticket endpoints (/v1/leases/:id/code/ticket, /v1/leases/:id/webvnc/ticket, /v1/leases/:id/egress/ticket) which are exploited in CVE-2026-8629 for privilege escalation by users with only visibility permissions.
author: SCW Feed Engine (AI-generated)
date: 2026-05-14
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-8629/
tags:
- attack.privilege_escalation
- attack.t1068
logsource:
category: webserver
detection:
selection:
cs-method:
- 'POST'
cs-uri:
- '/v1/leases/*/code/ticket'
- '/v1/leases/*/webvnc/ticket'
- '/v1/leases/*/egress/ticket'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-8629 | Privilege Escalation | Crabbox prior to v0.12.0 |
| CVE-2026-8629 | Privilege Escalation | Insufficient access control checks |
| CVE-2026-8629 | Privilege Escalation | POST request to /v1/leases/:id/code/ticket |
| CVE-2026-8629 | Privilege Escalation | POST request to /v1/leases/:id/webvnc/ticket |
| CVE-2026-8629 | Privilege Escalation | POST request to /v1/leases/:id/egress/ticket |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 14, 2026 at 23:17 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.