Skip to content

File tree

advisories/github-reviewed/2026/03/GHSA-39mp-545q-w789/GHSA-39mp-545q-w789.json

Lines changed: 32 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-39mp-545q-w789",
4-
"modified": "2026-04-10T17:19:15Z",
4+
"modified": "2026-04-10T19:45:32Z",
55
"published": "2026-03-30T19:06:22Z",
66
"aliases": [
77
"CVE-2026-35620"
@@ -12,6 +12,10 @@
1212
{
1313
"type": "CVSS_V3",
1414
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -40,18 +44,43 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-39mp-545q-w789"
4246
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-vqvg-86cc-cg83"
50+
},
51+
{
52+
"type": "ADVISORY",
53+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35620"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://github.com/openclaw/openclaw/commit/555b2578a8cc6e1b93f717496935ead97bfbed8b"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://github.com/openclaw/openclaw/commit/ccfeecb6887cd97937e33a71877ad512741e82b2"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://github.com/openclaw/openclaw/commit/ea018a68ccb92dbc735bc1df9880d5c95c63ca35"
66+
},
4367
{
4468
"type": "PACKAGE",
4569
"url": "https://github.com/openclaw/openclaw"
70+
},
71+
{
72+
"type": "WEB",
73+
"url": "https://www.vulncheck.com/advisories/openclaw-missing-authorization-in-send-and-allowlist-chat-commands"
4674
}
4775
],
4876
"database_specific": {
4977
"cwe_ids": [
50-
"CWE-285"
78+
"CWE-285",
79+
"CWE-862"
5180
],
5281
"severity": "MODERATE",
5382
"github_reviewed": true,
5483
"github_reviewed_at": "2026-03-30T19:06:22Z",
55-
"nvd_published_at": null
84+
"nvd_published_at": "2026-04-10T17:17:04Z"
5685
}
5786
}

advisories/github-reviewed/2026/03/GHSA-4hmj-39m8-jwc7/GHSA-4hmj-39m8-jwc7.json

Lines changed: 20 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,23 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4hmj-39m8-jwc7",
4-
"modified": "2026-04-10T17:23:40Z",
4+
"modified": "2026-04-10T19:44:42Z",
55
"published": "2026-03-29T15:50:41Z",
66
"aliases": [
77
"CVE-2026-35651"
88
],
99
"summary": "OpenClaw has ACP CLI approval prompt ANSI escape sequence injection",
1010
"details": "## Summary\n\nACP CLI approval prompt ANSI escape sequence injection\n\n## Affected Packages / Versions\n\n- Package: `openclaw`\n- Affected versions: `>= 2026.2.13, <= 2026.3.24`\n- First patched version: `2026.3.25`\n- Latest published npm version at verification time: `2026.3.24`\n\n## Details\n\nACP tool titles could previously carry ANSI control sequences into approval prompts and permission logs, letting untrusted tool metadata spoof terminal output. Commit `464e2c10a5edceb380d815adb6ff56e1a4c50f60` sanitizes tool titles at the source and broadens ANSI stripping to full CSI sequences.\n\nVerified vulnerable on tag `v2026.3.24` and fixed on `main` by commit `464e2c10a5edceb380d815adb6ff56e1a4c50f60`.\n\n## Fix Commit(s)\n\n- `464e2c10a5edceb380d815adb6ff56e1a4c50f60`",
11-
"severity": [],
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/"
19+
}
20+
],
1221
"affected": [
1322
{
1423
"package": {
@@ -38,13 +47,21 @@
3847
"type": "WEB",
3948
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4hmj-39m8-jwc7"
4049
},
50+
{
51+
"type": "ADVISORY",
52+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35651"
53+
},
4154
{
4255
"type": "WEB",
4356
"url": "https://github.com/openclaw/openclaw/commit/464e2c10a5edceb380d815adb6ff56e1a4c50f60"
4457
},
4558
{
4659
"type": "PACKAGE",
4760
"url": "https://github.com/openclaw/openclaw"
61+
},
62+
{
63+
"type": "WEB",
64+
"url": "https://www.vulncheck.com/advisories/openclaw-ansi-escape-sequence-injection-in-approval-prompt"
4865
}
4966
],
5067
"database_specific": {
@@ -55,6 +72,6 @@
5572
"severity": "MODERATE",
5673
"github_reviewed": true,
5774
"github_reviewed_at": "2026-03-29T15:50:41Z",
58-
"nvd_published_at": null
75+
"nvd_published_at": "2026-04-10T17:17:05Z"
5976
}
6077
}

advisories/github-reviewed/2026/03/GHSA-68f8-9mhj-h2mp/GHSA-68f8-9mhj-h2mp.json

Lines changed: 24 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,23 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-68f8-9mhj-h2mp",
4-
"modified": "2026-04-10T17:18:57Z",
4+
"modified": "2026-04-10T19:45:08Z",
55
"published": "2026-03-30T18:41:15Z",
66
"aliases": [
77
"CVE-2026-35619"
88
],
99
"summary": "OpenClaw has a Gateway HTTP /v1/models Route Bypasses Operator Read Scope",
1010
"details": "> Fixed in OpenClaw 2026.3.24, the current shipping release.\n\n## Summary\n\nThe OpenAI-compatible HTTP endpoint `/v1/models` accepts bearer auth but does not enforce operator method scopes.\n\nIn contrast, the WebSocket RPC path enforces `operator.read` for `models.list`.\n\nA caller connected with `operator.approvals` (no read scope) is rejected for `models.list` (`missing scope: operator.read`) but can still enumerate model metadata through HTTP `/v1/models`.\n\nConfirmed on current `main` at commit `06de515b6c42816b62ec752e1c221cab67b38501`.\n\n## Details\n\nThe WS control-plane path enforces role/scope checks centrally before dispatching methods. For non-admin operators, this includes required method scopes such as `operator.read` for `models.list`.\n\nThe HTTP compatibility path for `/v1/models` performs bearer authorization and then returns model metadata; it does not apply an equivalent scope check.\n\nAs reproduced, a caller with only `operator.approvals` can:\n\n1. connect successfully,\n2. fail `models.list` over WS with `missing scope: operator.read`,\n3. fetch `/v1/models` over HTTP with status 200 and model data.\n\nThis is a cross-surface authorization inconsistency where the stricter WS policy can be bypassed via HTTP.\n\n## Impact\n\n- Callers lacking `operator.read` can still enumerate gateway model metadata through HTTP compatibility routes.\n- Breaks scope model consistency between WS RPC and HTTP surfaces.\n- Weakens least-privilege expectations for operators granted non-read scopes.\n\n## Patch Suggestion\n\n### 1) Enforce read scope on `/v1/models` routes\n\nApply a scope gate equivalent to `models.list` before serving `/v1/models` or `/v1/models/:id`.\n\n### 2) Reuse centralized scope-authorization helper for HTTP compatibility endpoints\n\nUse the same operator scope logic used by WS dispatch (`authorizeOperatorScopesForMethod(...)`) to prevent policy drift.\n\n### 3) Add regression tests\n\nKeep this PoC and add explicit negative/positive controls:\n\n- `operator.approvals` without read is rejected on HTTP `/v1/models`.\n- `operator.read` is accepted on both WS `models.list` and HTTP `/v1/models`.\n\n## Credit\n\nReported by @zpbrent.",
11-
"severity": [],
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
19+
}
20+
],
1221
"affected": [
1322
{
1423
"package": {
@@ -38,9 +47,21 @@
3847
"type": "WEB",
3948
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-68f8-9mhj-h2mp"
4049
},
50+
{
51+
"type": "ADVISORY",
52+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35619"
53+
},
54+
{
55+
"type": "WEB",
56+
"url": "https://github.com/openclaw/openclaw/commit/06de515b6c42816b62ec752e1c221cab67b38501"
57+
},
4158
{
4259
"type": "PACKAGE",
4360
"url": "https://github.com/openclaw/openclaw"
61+
},
62+
{
63+
"type": "WEB",
64+
"url": "https://www.vulncheck.com/advisories/openclaw-authorization-bypass-via-http-v1-models-endpoint"
4465
}
4566
],
4667
"database_specific": {
@@ -51,6 +72,6 @@
5172
"severity": "MODERATE",
5273
"github_reviewed": true,
5374
"github_reviewed_at": "2026-03-30T18:41:15Z",
54-
"nvd_published_at": null
75+
"nvd_published_at": "2026-04-10T17:17:04Z"
5576
}
5677
}

advisories/github-reviewed/2026/03/GHSA-m3mh-3mpg-37hw/GHSA-m3mh-3mpg-37hw.json

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-m3mh-3mpg-37hw",
4-
"modified": "2026-04-10T17:20:47Z",
4+
"modified": "2026-04-10T19:45:21Z",
55
"published": "2026-03-30T18:52:09Z",
66
"aliases": [
77
"CVE-2026-35641"
@@ -12,6 +12,10 @@
1212
{
1313
"type": "CVSS_V3",
1414
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -43,18 +47,27 @@
4347
"type": "WEB",
4448
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-m3mh-3mpg-37hw"
4549
},
50+
{
51+
"type": "ADVISORY",
52+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35641"
53+
},
4654
{
4755
"type": "PACKAGE",
4856
"url": "https://github.com/openclaw/openclaw"
57+
},
58+
{
59+
"type": "WEB",
60+
"url": "https://www.vulncheck.com/advisories/openclaw-arbitrary-code-execution-via-npmrc-in-local-plugin-hook-installation"
4961
}
5062
],
5163
"database_specific": {
5264
"cwe_ids": [
65+
"CWE-349",
5366
"CWE-426"
5467
],
5568
"severity": "HIGH",
5669
"github_reviewed": true,
5770
"github_reviewed_at": "2026-03-30T18:52:09Z",
58-
"nvd_published_at": null
71+
"nvd_published_at": "2026-04-10T17:17:04Z"
5972
}
6073
}

advisories/github-reviewed/2026/03/GHSA-w6m8-cqvj-pg5v/GHSA-w6m8-cqvj-pg5v.json

Lines changed: 16 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-w6m8-cqvj-pg5v",
4-
"modified": "2026-04-10T17:28:43Z",
4+
"modified": "2026-04-10T19:44:53Z",
55
"published": "2026-03-30T18:32:03Z",
66
"aliases": [
77
"CVE-2026-35665"
@@ -12,6 +12,10 @@
1212
{
1313
"type": "CVSS_V3",
1414
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -44,18 +48,27 @@
4448
"type": "WEB",
4549
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-x4vp-4235-65hg"
4650
},
51+
{
52+
"type": "ADVISORY",
53+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35665"
54+
},
4755
{
4856
"type": "PACKAGE",
4957
"url": "https://github.com/openclaw/openclaw"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://www.vulncheck.com/advisories/openclaw-denial-of-service-via-feishu-webhook-pre-auth-body-parsing"
5062
}
5163
],
5264
"database_specific": {
5365
"cwe_ids": [
54-
"CWE-400"
66+
"CWE-400",
67+
"CWE-405"
5568
],
5669
"severity": "MODERATE",
5770
"github_reviewed": true,
5871
"github_reviewed_at": "2026-03-30T18:32:03Z",
59-
"nvd_published_at": null
72+
"nvd_published_at": "2026-04-10T17:17:08Z"
6073
}
6174
}

advisories/github-reviewed/2026/03/GHSA-wv46-v6xc-2qhf/GHSA-wv46-v6xc-2qhf.json

Lines changed: 22 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,21 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-wv46-v6xc-2qhf",
4-
"modified": "2026-04-10T17:30:13Z",
4+
"modified": "2026-04-10T19:46:22Z",
55
"published": "2026-03-26T19:08:16Z",
66
"aliases": [
77
"CVE-2026-35670"
88
],
99
"summary": "OpenClaw: Synology Chat reply delivery could be rebound through username-based user resolution.",
1010
"details": "## Summary\nSynology Chat reply delivery could rebind to a mutable username match instead of the stable numeric user_id recorded by the webhook event.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Affected: < 2026.3.22\n- Fixed: >= 2026.3.22\n- Latest released tag checked: `v2026.3.23-2` (`630f1479c44f78484dfa21bb407cbe6f171dac87`)\n- Latest published npm version checked: `2026.3.23-2`\n\n## Fix Commit(s)\n- `7ade3553b74ee3f461c4acd216653d5ba411f455`\n\n## Release Status\nThe fix shipped in `v2026.3.22` and remains present in `v2026.3.23` and `v2026.3.23-2`.\n\n## Code-Level Confirmation\n- extensions/synology-chat/src/webhook-handler.ts now keeps replies bound to the stable webhook user identifier unless an explicit dangerous opt-in is enabled.\n- extensions/synology-chat/src/config-schema.ts contains the explicit dangerous opt-in seam instead of silent username rebinding.\n\nOpenClaw thanks @nexrin for reporting.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N"
15+
},
1216
{
1317
"type": "CVSS_V4",
14-
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
18+
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -40,23 +44,36 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-wv46-v6xc-2qhf"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35670"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dac87"
54+
},
4355
{
4456
"type": "WEB",
4557
"url": "https://github.com/openclaw/openclaw/commit/7ade3553b74ee3f461c4acd216653d5ba411f455"
4658
},
4759
{
4860
"type": "PACKAGE",
4961
"url": "https://github.com/openclaw/openclaw"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://www.vulncheck.com/advisories/openclaw-webhook-reply-rebinding-via-username-resolution-in-synology-chat"
5066
}
5167
],
5268
"database_specific": {
5369
"cwe_ids": [
5470
"CWE-639",
55-
"CWE-706"
71+
"CWE-706",
72+
"CWE-807"
5673
],
57-
"severity": "HIGH",
74+
"severity": "MODERATE",
5875
"github_reviewed": true,
5976
"github_reviewed_at": "2026-03-26T19:08:16Z",
60-
"nvd_published_at": null
77+
"nvd_published_at": "2026-04-10T17:17:09Z"
6178
}
6279
}

advisories/github-reviewed/2026/04/GHSA-2crg-3p73-43xp/GHSA-2crg-3p73-43xp.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2crg-3p73-43xp",
4-
"modified": "2026-04-10T17:24:31Z",
4+
"modified": "2026-04-10T19:46:38Z",
55
"published": "2026-04-10T17:24:31Z",
66
"aliases": [
77
"CVE-2026-40073"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://github.com/sveltejs/kit/security/advisories/GHSA-2crg-3p73-43xp"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-40073"
49+
},
4650
{
4751
"type": "WEB",
4852
"url": "https://github.com/sveltejs/kit/commit/3202ed6c98f9e8d86bf0c4c7ad0f2e273e5e3b95"
@@ -54,6 +58,10 @@
5458
{
5559
"type": "WEB",
5660
"url": "https://github.com/sveltejs/kit/releases/tag/%40sveltejs%2Fkit%402.57.1"
61+
},
62+
{
63+
"type": "WEB",
64+
"url": "https://github.com/sveltejs/kit/releases/tag/@sveltejs/kit@2.57.1"
5765
}
5866
],
5967
"database_specific": {
@@ -63,6 +71,6 @@
6371
"severity": "HIGH",
6472
"github_reviewed": true,
6573
"github_reviewed_at": "2026-04-10T17:24:31Z",
66-
"nvd_published_at": null
74+
"nvd_published_at": "2026-04-10T17:17:12Z"
6775
}
6876
}

0 commit comments

Comments
 (0)