Skip to content

Commit 106c975

Browse files

File tree

6 files changed

+38
-12
lines changed

6 files changed

+38
-12
lines changed

advisories/github-reviewed/2026/04/GHSA-5qhv-x9j4-c3vm/GHSA-5qhv-x9j4-c3vm.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5qhv-x9j4-c3vm",
4-
"modified": "2026-04-04T05:37:10Z",
4+
"modified": "2026-04-06T23:43:53Z",
55
"published": "2026-04-04T05:37:10Z",
66
"aliases": [
77
"CVE-2026-35394"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/mobile-next/mobile-mcp/security/advisories/GHSA-5qhv-x9j4-c3vm"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35394"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/mobile-next/mobile-mcp/pull/299"
@@ -60,6 +64,6 @@
6064
"severity": "HIGH",
6165
"github_reviewed": true,
6266
"github_reviewed_at": "2026-04-04T05:37:10Z",
63-
"nvd_published_at": null
67+
"nvd_published_at": "2026-04-06T21:16:21Z"
6468
}
6569
}

advisories/github-reviewed/2026/04/GHSA-6r34-94wq-jhrc/GHSA-6r34-94wq-jhrc.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6r34-94wq-jhrc",
4-
"modified": "2026-04-06T17:53:59Z",
4+
"modified": "2026-04-06T23:43:57Z",
55
"published": "2026-04-06T17:53:59Z",
66
"aliases": [
77
"CVE-2026-35201"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/davidfstr/rdiscount/security/advisories/GHSA-6r34-94wq-jhrc"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35201"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/davidfstr/rdiscount/commit/b1a16445e92e0d12c07594dedcdc56f80b317761"
@@ -60,6 +64,6 @@
6064
"severity": "MODERATE",
6165
"github_reviewed": true,
6266
"github_reviewed_at": "2026-04-06T17:53:59Z",
63-
"nvd_published_at": null
67+
"nvd_published_at": "2026-04-06T20:16:27Z"
6468
}
6569
}

advisories/github-reviewed/2026/04/GHSA-7gvf-3w72-p2pg/GHSA-7gvf-3w72-p2pg.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7gvf-3w72-p2pg",
4-
"modified": "2026-04-04T06:41:08Z",
4+
"modified": "2026-04-06T23:44:01Z",
55
"published": "2026-04-04T06:41:08Z",
66
"aliases": [
77
"CVE-2026-35459"
@@ -44,6 +44,14 @@
4444
"type": "ADVISORY",
4545
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33992"
4646
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35459"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/pyload/pyload/commit/33c55da084320430edfd941b60e3da0eb1be9443"
54+
},
4755
{
4856
"type": "PACKAGE",
4957
"url": "https://github.com/pyload/pyload"
@@ -56,6 +64,6 @@
5664
"severity": "CRITICAL",
5765
"github_reviewed": true,
5866
"github_reviewed_at": "2026-04-04T06:41:08Z",
59-
"nvd_published_at": null
67+
"nvd_published_at": "2026-04-06T20:16:28Z"
6068
}
6169
}

advisories/github-reviewed/2026/04/GHSA-g8mv-vp7j-qp64/GHSA-g8mv-vp7j-qp64.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g8mv-vp7j-qp64",
4-
"modified": "2026-04-03T04:07:55Z",
4+
"modified": "2026-04-06T23:43:45Z",
55
"published": "2026-04-03T04:07:55Z",
66
"aliases": [
77
"CVE-2026-35392"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/patrickhener/goshs/security/advisories/GHSA-g8mv-vp7j-qp64"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35392"
46+
},
4347
{
4448
"type": "PACKAGE",
4549
"url": "https://github.com/patrickhener/goshs"
@@ -52,6 +56,6 @@
5256
"severity": "CRITICAL",
5357
"github_reviewed": true,
5458
"github_reviewed_at": "2026-04-03T04:07:55Z",
55-
"nvd_published_at": null
59+
"nvd_published_at": "2026-04-06T21:16:21Z"
5660
}
5761
}

advisories/github-reviewed/2026/04/GHSA-jg56-wf8x-qrv5/GHSA-jg56-wf8x-qrv5.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jg56-wf8x-qrv5",
4-
"modified": "2026-04-03T04:08:20Z",
4+
"modified": "2026-04-06T23:43:49Z",
55
"published": "2026-04-03T04:08:20Z",
66
"aliases": [
77
"CVE-2026-35393"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/patrickhener/goshs/security/advisories/GHSA-jg56-wf8x-qrv5"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35393"
46+
},
4347
{
4448
"type": "PACKAGE",
4549
"url": "https://github.com/patrickhener/goshs"
@@ -52,6 +56,6 @@
5256
"severity": "CRITICAL",
5357
"github_reviewed": true,
5458
"github_reviewed_at": "2026-04-03T04:08:20Z",
55-
"nvd_published_at": null
59+
"nvd_published_at": "2026-04-06T21:16:21Z"
5660
}
5761
}

advisories/github-reviewed/2026/04/GHSA-p9ff-h696-f583/GHSA-p9ff-h696-f583.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-p9ff-h696-f583",
4-
"modified": "2026-04-06T18:03:24Z",
4+
"modified": "2026-04-06T23:44:10Z",
55
"published": "2026-04-06T18:03:24Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2026-39363"
8+
],
79
"summary": "Vite Vulnerable to Arbitrary File Read via Vite Dev Server WebSocket",
810
"details": "### Summary\n\n[`server.fs`](https://vite.dev/config/server-options#server-fs-strict) check was not enforced to the `fetchModule` method that is exposed in Vite dev server's WebSocket. \n\n### Impact\n\nOnly apps that match the following conditions are affected:\n\n- explicitly exposes the Vite dev server to the network (using `--host` or [`server.host` config option](https://vitejs.dev/config/server-options.html#server-host))\n- WebSocket is not disabled by `server.ws: false`\n\nArbitrary files on the server (development machine, CI environment, container, etc.) can be exposed.\n\n### Details\n\nIf it is possible to connect to the Vite dev server’s WebSocket **without an `Origin` header**, an attacker can invoke `fetchModule` via the custom WebSocket event `vite:invoke` and combine `file://...` with `?raw` (or `?inline`) to retrieve the contents of arbitrary files on the server as a JavaScript string (e.g., `export default \"...\"`).\n\nThe access control enforced in the HTTP request path (such as `server.fs.allow`) is not applied to this WebSocket-based execution path.\n\n### PoC\n\n1. Start the dev server on the target \n Example (used during validation with this repository):\n ```bash\n pnpm -C playground/alias exec vite --host 0.0.0.0 --port 5173\n ```\n\n2. Confirm that access is blocked via the HTTP path (example: arbitrary file)\n ```bash\n curl -i 'http://localhost:5173/@fs/etc/passwd?raw'\n ```\n Result: `403 Restricted` (outside the allow list)\n <img width=\"3898\" height=\"1014\" alt=\"image\" src=\"https://github.com/user-attachments/assets/f6593377-549c-45d7-b562-5c19833438af\" />\n\n3. Confirm that the same file can be retrieved via the WebSocket path\n By connecting to the HMR WebSocket without an `Origin` header and sending a `vite:invoke` request that calls `fetchModule` with a `file://...` URL and `?raw`, the file contents are returned as a JavaScript module.\n <img width=\"1049\" height=\"296\" alt=\"image\" src=\"https://github.com/user-attachments/assets/af969f7b-d34e-4af4-8adb-5e2b83b31972\" />\n <img width=\"1382\" height=\"955\" alt=\"image\" src=\"https://github.com/user-attachments/assets/6a230d2e-197a-4c9c-b373-d0129756d5d7\" />",
911
"severity": [

0 commit comments

Comments
 (0)