CVE-2026-6635 (GCVE-0-2026-6635)
Vulnerability from cvelistv5 – Published: 2026-04-20 11:45 – Updated: 2026-04-20 13:26
VLAI?
Title
rowboatlabs rowboat tools_webhook app.py tool_call improper authentication
Summary
A security vulnerability has been detected in rowboatlabs rowboat up to 0.1.67. This impacts the function tool_call of the file apps/experimental/tools_webhook/app.py of the component tools_webhook. Such manipulation of the argument X-Tools-JWE leads to improper authentication. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity ?
CWE
- CWE-287 - Improper Authentication
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| rowboatlabs | rowboat |
Affected:
0.1.0
Affected: 0.1.1 Affected: 0.1.2 Affected: 0.1.3 Affected: 0.1.4 Affected: 0.1.5 Affected: 0.1.6 Affected: 0.1.7 Affected: 0.1.8 Affected: 0.1.9 Affected: 0.1.10 Affected: 0.1.11 Affected: 0.1.12 Affected: 0.1.13 Affected: 0.1.14 Affected: 0.1.15 Affected: 0.1.16 Affected: 0.1.17 Affected: 0.1.18 Affected: 0.1.19 Affected: 0.1.20 Affected: 0.1.21 Affected: 0.1.22 Affected: 0.1.23 Affected: 0.1.24 Affected: 0.1.25 Affected: 0.1.26 Affected: 0.1.27 Affected: 0.1.28 Affected: 0.1.29 Affected: 0.1.30 Affected: 0.1.31 Affected: 0.1.32 Affected: 0.1.33 Affected: 0.1.34 Affected: 0.1.35 Affected: 0.1.36 Affected: 0.1.37 Affected: 0.1.38 Affected: 0.1.39 Affected: 0.1.40 Affected: 0.1.41 Affected: 0.1.42 Affected: 0.1.43 Affected: 0.1.44 Affected: 0.1.45 Affected: 0.1.46 Affected: 0.1.47 Affected: 0.1.48 Affected: 0.1.49 Affected: 0.1.50 Affected: 0.1.51 Affected: 0.1.52 Affected: 0.1.53 Affected: 0.1.54 Affected: 0.1.55 Affected: 0.1.56 Affected: 0.1.57 Affected: 0.1.58 Affected: 0.1.59 Affected: 0.1.60 Affected: 0.1.61 Affected: 0.1.62 Affected: 0.1.63 Affected: 0.1.64 Affected: 0.1.65 Affected: 0.1.66 Affected: 0.1.67 |
Credits
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-6635",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-20T13:26:25.301774Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-20T13:26:31.802Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"modules": [
"tools_webhook"
],
"product": "rowboat",
"vendor": "rowboatlabs",
"versions": [
{
"status": "affected",
"version": "0.1.0"
},
{
"status": "affected",
"version": "0.1.1"
},
{
"status": "affected",
"version": "0.1.2"
},
{
"status": "affected",
"version": "0.1.3"
},
{
"status": "affected",
"version": "0.1.4"
},
{
"status": "affected",
"version": "0.1.5"
},
{
"status": "affected",
"version": "0.1.6"
},
{
"status": "affected",
"version": "0.1.7"
},
{
"status": "affected",
"version": "0.1.8"
},
{
"status": "affected",
"version": "0.1.9"
},
{
"status": "affected",
"version": "0.1.10"
},
{
"status": "affected",
"version": "0.1.11"
},
{
"status": "affected",
"version": "0.1.12"
},
{
"status": "affected",
"version": "0.1.13"
},
{
"status": "affected",
"version": "0.1.14"
},
{
"status": "affected",
"version": "0.1.15"
},
{
"status": "affected",
"version": "0.1.16"
},
{
"status": "affected",
"version": "0.1.17"
},
{
"status": "affected",
"version": "0.1.18"
},
{
"status": "affected",
"version": "0.1.19"
},
{
"status": "affected",
"version": "0.1.20"
},
{
"status": "affected",
"version": "0.1.21"
},
{
"status": "affected",
"version": "0.1.22"
},
{
"status": "affected",
"version": "0.1.23"
},
{
"status": "affected",
"version": "0.1.24"
},
{
"status": "affected",
"version": "0.1.25"
},
{
"status": "affected",
"version": "0.1.26"
},
{
"status": "affected",
"version": "0.1.27"
},
{
"status": "affected",
"version": "0.1.28"
},
{
"status": "affected",
"version": "0.1.29"
},
{
"status": "affected",
"version": "0.1.30"
},
{
"status": "affected",
"version": "0.1.31"
},
{
"status": "affected",
"version": "0.1.32"
},
{
"status": "affected",
"version": "0.1.33"
},
{
"status": "affected",
"version": "0.1.34"
},
{
"status": "affected",
"version": "0.1.35"
},
{
"status": "affected",
"version": "0.1.36"
},
{
"status": "affected",
"version": "0.1.37"
},
{
"status": "affected",
"version": "0.1.38"
},
{
"status": "affected",
"version": "0.1.39"
},
{
"status": "affected",
"version": "0.1.40"
},
{
"status": "affected",
"version": "0.1.41"
},
{
"status": "affected",
"version": "0.1.42"
},
{
"status": "affected",
"version": "0.1.43"
},
{
"status": "affected",
"version": "0.1.44"
},
{
"status": "affected",
"version": "0.1.45"
},
{
"status": "affected",
"version": "0.1.46"
},
{
"status": "affected",
"version": "0.1.47"
},
{
"status": "affected",
"version": "0.1.48"
},
{
"status": "affected",
"version": "0.1.49"
},
{
"status": "affected",
"version": "0.1.50"
},
{
"status": "affected",
"version": "0.1.51"
},
{
"status": "affected",
"version": "0.1.52"
},
{
"status": "affected",
"version": "0.1.53"
},
{
"status": "affected",
"version": "0.1.54"
},
{
"status": "affected",
"version": "0.1.55"
},
{
"status": "affected",
"version": "0.1.56"
},
{
"status": "affected",
"version": "0.1.57"
},
{
"status": "affected",
"version": "0.1.58"
},
{
"status": "affected",
"version": "0.1.59"
},
{
"status": "affected",
"version": "0.1.60"
},
{
"status": "affected",
"version": "0.1.61"
},
{
"status": "affected",
"version": "0.1.62"
},
{
"status": "affected",
"version": "0.1.63"
},
{
"status": "affected",
"version": "0.1.64"
},
{
"status": "affected",
"version": "0.1.65"
},
{
"status": "affected",
"version": "0.1.66"
},
{
"status": "affected",
"version": "0.1.67"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "davidgilmore (VulDB User)"
},
{
"lang": "en",
"type": "coordinator",
"value": "VulDB CNA Team"
}
],
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability has been detected in rowboatlabs rowboat up to 0.1.67. This impacts the function tool_call of the file apps/experimental/tools_webhook/app.py of the component tools_webhook. Such manipulation of the argument X-Tools-JWE leads to improper authentication. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 7.5,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-287",
"description": "Improper Authentication",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-20T11:45:12.769Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-358269 | rowboatlabs rowboat tools_webhook app.py tool_call improper authentication",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/vuln/358269"
},
{
"name": "VDB-358269 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/vuln/358269/cti"
},
{
"name": "Submit #793433 | Rowboat Labs Rowboat 0.1.67 Authentication Bypass Issues",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/submit/793433"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/Dave-gilmore-aus/security-advisories/blob/main/rowbat-advisory"
}
],
"timeline": [
{
"lang": "en",
"time": "2026-04-19T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2026-04-19T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2026-04-19T21:25:14.000Z",
"value": "VulDB entry last update"
}
],
"title": "rowboatlabs rowboat tools_webhook app.py tool_call improper authentication"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2026-6635",
"datePublished": "2026-04-20T11:45:12.769Z",
"dateReserved": "2026-04-19T19:20:06.278Z",
"dateUpdated": "2026-04-20T13:26:31.802Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-6635",
"date": "2026-04-20",
"epss": "0.00061",
"percentile": "0.19048"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-6635\",\"sourceIdentifier\":\"cna@vuldb.com\",\"published\":\"2026-04-20T12:16:09.673\",\"lastModified\":\"2026-04-20T12:16:09.673\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A security vulnerability has been detected in rowboatlabs rowboat up to 0.1.67. This impacts the function tool_call of the file apps/experimental/tools_webhook/app.py of the component tools_webhook. Such manipulation of the argument X-Tools-JWE leads to improper authentication. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":6.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"LOW\",\"vulnIntegrityImpact\":\"LOW\",\"vulnAvailabilityImpact\":\"LOW\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"PROOF_OF_CONCEPT\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":3.4}],\"cvssMetricV2\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"references\":[{\"url\":\"https://github.com/Dave-gilmore-aus/security-advisories/blob/main/rowbat-advisory\",\"source\":\"cna@vuldb.com\"},{\"url\":\"https://vuldb.com/submit/793433\",\"source\":\"cna@vuldb.com\"},{\"url\":\"https://vuldb.com/vuln/358269\",\"source\":\"cna@vuldb.com\"},{\"url\":\"https://vuldb.com/vuln/358269/cti\",\"source\":\"cna@vuldb.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-6635\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-20T13:26:25.301774Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-20T13:26:28.365Z\"}}], \"cna\": {\"title\": \"rowboatlabs rowboat tools_webhook app.py tool_call improper authentication\", \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"davidgilmore (VulDB User)\"}, {\"lang\": \"en\", \"type\": \"coordinator\", \"value\": \"VulDB CNA Team\"}], \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 6.9, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P\"}}, {\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R\"}}, {\"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R\"}}, {\"cvssV2_0\": {\"version\": \"2.0\", \"baseScore\": 7.5, \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR\"}}], \"affected\": [{\"vendor\": \"rowboatlabs\", \"modules\": [\"tools_webhook\"], \"product\": \"rowboat\", \"versions\": [{\"status\": \"affected\", \"version\": \"0.1.0\"}, {\"status\": \"affected\", \"version\": \"0.1.1\"}, {\"status\": \"affected\", \"version\": \"0.1.2\"}, {\"status\": \"affected\", \"version\": \"0.1.3\"}, {\"status\": \"affected\", \"version\": \"0.1.4\"}, {\"status\": \"affected\", \"version\": \"0.1.5\"}, {\"status\": \"affected\", \"version\": \"0.1.6\"}, {\"status\": \"affected\", \"version\": \"0.1.7\"}, {\"status\": \"affected\", \"version\": \"0.1.8\"}, {\"status\": \"affected\", \"version\": \"0.1.9\"}, {\"status\": \"affected\", \"version\": \"0.1.10\"}, {\"status\": \"affected\", \"version\": \"0.1.11\"}, {\"status\": \"affected\", \"version\": \"0.1.12\"}, {\"status\": \"affected\", \"version\": \"0.1.13\"}, {\"status\": \"affected\", \"version\": \"0.1.14\"}, {\"status\": \"affected\", \"version\": \"0.1.15\"}, {\"status\": \"affected\", \"version\": \"0.1.16\"}, {\"status\": \"affected\", \"version\": \"0.1.17\"}, {\"status\": \"affected\", \"version\": \"0.1.18\"}, {\"status\": \"affected\", \"version\": \"0.1.19\"}, {\"status\": \"affected\", \"version\": \"0.1.20\"}, {\"status\": \"affected\", \"version\": \"0.1.21\"}, {\"status\": \"affected\", \"version\": \"0.1.22\"}, {\"status\": \"affected\", \"version\": \"0.1.23\"}, {\"status\": \"affected\", \"version\": \"0.1.24\"}, {\"status\": \"affected\", \"version\": \"0.1.25\"}, {\"status\": \"affected\", \"version\": \"0.1.26\"}, {\"status\": \"affected\", \"version\": \"0.1.27\"}, {\"status\": \"affected\", \"version\": \"0.1.28\"}, {\"status\": \"affected\", \"version\": \"0.1.29\"}, {\"status\": \"affected\", \"version\": \"0.1.30\"}, {\"status\": \"affected\", \"version\": \"0.1.31\"}, {\"status\": \"affected\", \"version\": \"0.1.32\"}, {\"status\": \"affected\", \"version\": \"0.1.33\"}, {\"status\": \"affected\", \"version\": \"0.1.34\"}, {\"status\": \"affected\", \"version\": \"0.1.35\"}, {\"status\": \"affected\", \"version\": \"0.1.36\"}, {\"status\": \"affected\", \"version\": \"0.1.37\"}, {\"status\": \"affected\", \"version\": \"0.1.38\"}, {\"status\": \"affected\", \"version\": \"0.1.39\"}, {\"status\": \"affected\", \"version\": \"0.1.40\"}, {\"status\": \"affected\", \"version\": \"0.1.41\"}, {\"status\": \"affected\", \"version\": \"0.1.42\"}, {\"status\": \"affected\", \"version\": \"0.1.43\"}, {\"status\": \"affected\", \"version\": \"0.1.44\"}, {\"status\": \"affected\", \"version\": \"0.1.45\"}, {\"status\": \"affected\", \"version\": \"0.1.46\"}, {\"status\": \"affected\", \"version\": \"0.1.47\"}, {\"status\": \"affected\", \"version\": \"0.1.48\"}, {\"status\": \"affected\", \"version\": \"0.1.49\"}, {\"status\": \"affected\", \"version\": \"0.1.50\"}, {\"status\": \"affected\", \"version\": \"0.1.51\"}, {\"status\": \"affected\", \"version\": \"0.1.52\"}, {\"status\": \"affected\", \"version\": \"0.1.53\"}, {\"status\": \"affected\", \"version\": \"0.1.54\"}, {\"status\": \"affected\", \"version\": \"0.1.55\"}, {\"status\": \"affected\", \"version\": \"0.1.56\"}, {\"status\": \"affected\", \"version\": \"0.1.57\"}, {\"status\": \"affected\", \"version\": \"0.1.58\"}, {\"status\": \"affected\", \"version\": \"0.1.59\"}, {\"status\": \"affected\", \"version\": \"0.1.60\"}, {\"status\": \"affected\", \"version\": \"0.1.61\"}, {\"status\": \"affected\", \"version\": \"0.1.62\"}, {\"status\": \"affected\", \"version\": \"0.1.63\"}, {\"status\": \"affected\", \"version\": \"0.1.64\"}, {\"status\": \"affected\", \"version\": \"0.1.65\"}, {\"status\": \"affected\", \"version\": \"0.1.66\"}, {\"status\": \"affected\", \"version\": \"0.1.67\"}]}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2026-04-19T00:00:00.000Z\", \"value\": \"Advisory disclosed\"}, {\"lang\": \"en\", \"time\": \"2026-04-19T02:00:00.000Z\", \"value\": \"VulDB entry created\"}, {\"lang\": \"en\", \"time\": \"2026-04-19T21:25:14.000Z\", \"value\": \"VulDB entry last update\"}], \"references\": [{\"url\": \"https://vuldb.com/vuln/358269\", \"name\": \"VDB-358269 | rowboatlabs rowboat tools_webhook app.py tool_call improper authentication\", \"tags\": [\"vdb-entry\", \"technical-description\"]}, {\"url\": \"https://vuldb.com/vuln/358269/cti\", \"name\": \"VDB-358269 | CTI Indicators (IOB, IOC, IOA)\", \"tags\": [\"signature\", \"permissions-required\"]}, {\"url\": \"https://vuldb.com/submit/793433\", \"name\": \"Submit #793433 | Rowboat Labs Rowboat 0.1.67 Authentication Bypass Issues\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://github.com/Dave-gilmore-aus/security-advisories/blob/main/rowbat-advisory\", \"tags\": [\"exploit\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A security vulnerability has been detected in rowboatlabs rowboat up to 0.1.67. This impacts the function tool_call of the file apps/experimental/tools_webhook/app.py of the component tools_webhook. Such manipulation of the argument X-Tools-JWE leads to improper authentication. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-287\", \"description\": \"Improper Authentication\"}]}], \"providerMetadata\": {\"orgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"shortName\": \"VulDB\", \"dateUpdated\": \"2026-04-20T11:45:12.769Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-6635\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-20T13:26:31.802Z\", \"dateReserved\": \"2026-04-19T19:20:06.278Z\", \"assignerOrgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"datePublished\": \"2026-04-20T11:45:12.769Z\", \"assignerShortName\": \"VulDB\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…