Skip to content

File tree

8 files changed

+128
-19
lines changed

8 files changed

+128
-19
lines changed

advisories/github-reviewed/2026/02/GHSA-7rcp-mxpq-72pj/GHSA-7rcp-mxpq-72pj.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7rcp-mxpq-72pj",
4-
"modified": "2026-03-05T21:53:10Z",
4+
"modified": "2026-03-06T01:04:48Z",
55
"published": "2026-02-18T17:41:00Z",
66
"aliases": [
77
"CVE-2026-28477"
88
],
99
"summary": "OpenClaw Chutes manual OAuth state validation bypass can cause credential substitution",
1010
"details": "## Summary\n\nThe manual Chutes OAuth login flow could accept attacker-controlled callback input in a way that bypassed OAuth CSRF state validation, potentially resulting in credential substitution.\n\n## Impact\n\nIf an attacker can convince a user to paste attacker-provided OAuth callback data during the manual login prompt, OpenClaw may exchange an attacker-obtained authorization code and persist tokens for the wrong Chutes account.\n\nThe automatic local callback flow is not affected (it validates state in the local HTTP callback handler).\n\n## Affected Packages / Versions\n\n- `openclaw` (npm): `<= 2026.2.13` when using the manual Chutes OAuth login flow.\n\n## Fix\n\nThe manual flow now requires the full redirect URL (must include `code` and `state`), validates the returned `state` against the expected value, and rejects code-only pastes.\n\n## Fix Commit(s)\n\n- a99ad11a4107ba8eac58f54a3c1a8a0cf5686f47\n\nThanks @aether-ai-agent for reporting.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N"
15+
},
1216
{
1317
"type": "CVSS_V4",
1418
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
@@ -40,6 +44,10 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-7rcp-mxpq-72pj"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28477"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/commit/a99ad11a4107ba8eac58f54a3c1a8a0cf5686f47"
@@ -51,6 +59,10 @@
5159
{
5260
"type": "WEB",
5361
"url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://www.vulncheck.com/advisories/openclaw-oauth-state-validation-bypass-in-manual-chutes-login-flow"
5466
}
5567
],
5668
"database_specific": {
@@ -60,6 +72,6 @@
6072
"severity": "MODERATE",
6173
"github_reviewed": true,
6274
"github_reviewed_at": "2026-02-18T17:41:00Z",
63-
"nvd_published_at": null
75+
"nvd_published_at": "2026-03-05T22:16:22Z"
6476
}
6577
}

advisories/github-reviewed/2026/02/GHSA-fh3f-q9qw-93j9/GHSA-fh3f-q9qw-93j9.json

Lines changed: 16 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fh3f-q9qw-93j9",
4-
"modified": "2026-03-05T21:54:01Z",
4+
"modified": "2026-03-06T01:04:59Z",
55
"published": "2026-02-19T19:41:07Z",
66
"aliases": [
77
"CVE-2026-28479"
@@ -12,6 +12,10 @@
1212
{
1313
"type": "CVSS_V3",
1414
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -43,6 +47,10 @@
4347
"type": "WEB",
4448
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-fh3f-q9qw-93j9"
4549
},
50+
{
51+
"type": "ADVISORY",
52+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28479"
53+
},
4654
{
4755
"type": "WEB",
4856
"url": "https://github.com/openclaw/openclaw/commit/559c8d9930eebb5356506ff1a8cd3dbaec92be77"
@@ -54,15 +62,20 @@
5462
{
5563
"type": "WEB",
5664
"url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.15"
65+
},
66+
{
67+
"type": "WEB",
68+
"url": "https://www.vulncheck.com/advisories/openclaw-cache-poisoning-via-deprecated-sha-hash-in-sandbox-configuration"
5769
}
5870
],
5971
"database_specific": {
6072
"cwe_ids": [
73+
"CWE-327",
6174
"CWE-328"
6275
],
63-
"severity": "MODERATE",
76+
"severity": "HIGH",
6477
"github_reviewed": true,
6578
"github_reviewed_at": "2026-02-19T19:41:07Z",
66-
"nvd_published_at": null
79+
"nvd_published_at": "2026-03-05T22:16:22Z"
6780
}
6881
}

advisories/github-reviewed/2026/02/GHSA-gq9c-wg68-gwj2/GHSA-gq9c-wg68-gwj2.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gq9c-wg68-gwj2",
4-
"modified": "2026-03-05T21:47:48Z",
4+
"modified": "2026-03-06T01:04:42Z",
55
"published": "2026-02-18T17:38:39Z",
66
"aliases": [
77
"CVE-2026-28462"
@@ -12,6 +12,10 @@
1212
{
1313
"type": "CVSS_V3",
1414
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -40,6 +44,10 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-gq9c-wg68-gwj2"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28462"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/pull/15652"
@@ -51,6 +59,10 @@
5159
{
5260
"type": "PACKAGE",
5361
"url": "https://github.com/openclaw/openclaw"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://www.vulncheck.com/advisories/openclaw-path-traversal-in-trace-and-download-output-paths"
5466
}
5567
],
5668
"database_specific": {
@@ -60,6 +72,6 @@
6072
"severity": "HIGH",
6173
"github_reviewed": true,
6274
"github_reviewed_at": "2026-02-18T17:38:39Z",
63-
"nvd_published_at": null
75+
"nvd_published_at": "2026-03-05T22:16:18Z"
6476
}
6577
}

advisories/github-reviewed/2026/03/GHSA-47q7-97xp-m272/GHSA-47q7-97xp-m272.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-47q7-97xp-m272",
4-
"modified": "2026-03-05T21:52:23Z",
4+
"modified": "2026-03-06T01:05:10Z",
55
"published": "2026-03-02T22:43:10Z",
66
"aliases": [
77
"CVE-2026-28475"
88
],
99
"summary": "OpenClaw: Config writes could persist resolved ${VAR} secrets to disk",
1010
"details": "## Summary\n\nOpenClaw hooks previously compared the provided hook token using a regular string comparison. Because this comparison is not constant-time, an attacker with network access to the hooks endpoint could potentially use timing measurements across many requests to gradually infer the token.\n\nIn practice, this typically requires hooks to be exposed to an untrusted network and a large number of requests; real-world latency and jitter can make reliable measurement difficult.\n\n## Affected Packages / Versions\n\n- openclaw (npm): < 2026.2.12\n\n## Patched Versions\n\n- openclaw (npm): >= 2026.2.12\n\n## Mitigations\n\n- Upgrade to openclaw >= 2026.2.12.\n- If users cannot upgrade immediately: restrict network access to the hooks endpoint and rotate the hooks token after updating.\n\n## Fix Commit(s)\n\n- 113ebfd6a23c4beb8a575d48f7482593254506ec\n\nOpenClaw thanks @akhmittra for reporting.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
15+
},
1216
{
1317
"type": "CVSS_V4",
1418
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
@@ -40,13 +44,21 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-47q7-97xp-m272"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28475"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/commit/113ebfd6a23c4beb8a575d48f7482593254506ec"
4654
},
4755
{
4856
"type": "PACKAGE",
4957
"url": "https://github.com/openclaw/openclaw"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://www.vulncheck.com/advisories/openclaw-timing-attack-via-hook-token-comparison"
5062
}
5163
],
5264
"database_specific": {
@@ -56,6 +68,6 @@
5668
"severity": "MODERATE",
5769
"github_reviewed": true,
5870
"github_reviewed_at": "2026-03-02T22:43:10Z",
59-
"nvd_published_at": null
71+
"nvd_published_at": "2026-03-05T22:16:21Z"
6072
}
6173
}

advisories/github-reviewed/2026/03/GHSA-gv46-4xfq-jv58/GHSA-gv46-4xfq-jv58.json

Lines changed: 26 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gv46-4xfq-jv58",
4-
"modified": "2026-03-05T21:49:14Z",
4+
"modified": "2026-03-06T01:05:53Z",
55
"published": "2026-03-02T23:24:54Z",
66
"aliases": [
77
"CVE-2026-28466"
@@ -12,6 +12,10 @@
1212
{
1313
"type": "CVSS_V3",
1414
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"
1519
}
1620
],
1721
"affected": [
@@ -40,13 +44,33 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-gv46-4xfq-jv58"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28466"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/commit/0af76f5f0e93540efbdf054895216c398692afcd"
4654
},
55+
{
56+
"type": "WEB",
57+
"url": "https://github.com/openclaw/openclaw/commit/318379cdb8d045da0009b0051bd0e712e5c65e2d"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://github.com/openclaw/openclaw/commit/a7af646fdab124a7536998db6bd6ad567d2b06b0"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://github.com/openclaw/openclaw/commit/c1594627421f95b6bc4ad7c606657dc75b5ad0ce"
66+
},
4767
{
4868
"type": "PACKAGE",
4969
"url": "https://github.com/openclaw/openclaw"
70+
},
71+
{
72+
"type": "WEB",
73+
"url": "https://www.vulncheck.com/advisories/openclaw-remote-code-execution-via-node-invoke-approval-bypass"
5074
}
5175
],
5276
"database_specific": {
@@ -58,6 +82,6 @@
5882
"severity": "CRITICAL",
5983
"github_reviewed": true,
6084
"github_reviewed_at": "2026-03-02T23:24:54Z",
61-
"nvd_published_at": null
85+
"nvd_published_at": "2026-03-05T22:16:19Z"
6286
}
6387
}

advisories/github-reviewed/2026/03/GHSA-jmm5-fvh5-gf4p/GHSA-jmm5-fvh5-gf4p.json

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jmm5-fvh5-gf4p",
4-
"modified": "2026-03-05T21:48:28Z",
4+
"modified": "2026-03-06T01:05:22Z",
55
"published": "2026-03-02T22:43:34Z",
66
"aliases": [
77
"CVE-2026-28464"
@@ -12,6 +12,10 @@
1212
{
1313
"type": "CVSS_V3",
1414
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -40,22 +44,30 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jmm5-fvh5-gf4p"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28464"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/commit/113ebfd6a23c4beb8a575d48f7482593254506ec"
4654
},
4755
{
4856
"type": "PACKAGE",
4957
"url": "https://github.com/openclaw/openclaw"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://www.vulncheck.com/advisories/openclaw-timing-attack-in-hooks-token-authentication"
5062
}
5163
],
5264
"database_specific": {
5365
"cwe_ids": [
5466
"CWE-208"
5567
],
56-
"severity": "MODERATE",
68+
"severity": "HIGH",
5769
"github_reviewed": true,
5870
"github_reviewed_at": "2026-03-02T22:43:34Z",
59-
"nvd_published_at": null
71+
"nvd_published_at": "2026-03-05T22:16:19Z"
6072
}
6173
}

advisories/github-reviewed/2026/03/GHSA-v892-hwpg-jwqp/GHSA-v892-hwpg-jwqp.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-v892-hwpg-jwqp",
4-
"modified": "2026-03-05T21:59:02Z",
4+
"modified": "2026-03-06T01:05:42Z",
55
"published": "2026-03-02T23:23:03Z",
66
"aliases": [
77
"CVE-2026-28486"
88
],
99
"summary": "OpenClaw vulnerable to path traversal (Zip Slip) in archive extraction during explicit installation commands",
1010
"details": "## Summary\n\nA path traversal (Zip Slip) issue in archive extraction during explicit installation commands could allow a crafted archive to write files outside the intended extraction directory.\n\n## Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Affected versions: `>=2026.1.16-2 <2026.2.14`\n- Fixed version: `2026.2.14`\n\n## Affected Commands / Flows\n\nThis only affects users who run installation commands against an untrusted archive (local file or download URL), for example:\n\n- `openclaw skills install` (download+extract installers)\n- `openclaw hooks install` (archive installs)\n- `openclaw plugins install` (archive installs)\n- `openclaw signal install` (signal-cli asset extraction)\n\nIt is not triggered by receiving messages or normal gateway operation.\n\n## Impact\n\nArbitrary file write as the current user. In the worst case this can be used for persistence or code execution if an attacker can convince a user to install a crafted archive.\n\n## Fix\n\n- Fix commit: `3aa94afcfd12104c683c9cad81faf434d0dadf87`\n- Released in: `2026.2.14`\n\n## Credits\n\nOpenClaw thanks @markmusson for reporting.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L"
15+
},
1216
{
1317
"type": "CVSS_V4",
1418
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
@@ -40,13 +44,21 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v892-hwpg-jwqp"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28486"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/commit/3aa94afcfd12104c683c9cad81faf434d0dadf87"
4654
},
4755
{
4856
"type": "PACKAGE",
4957
"url": "https://github.com/openclaw/openclaw"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://www.vulncheck.com/advisories/openclaw-path-traversal-zip-slip-in-archive-extraction-via-installation-commands"
5062
}
5163
],
5264
"database_specific": {
@@ -56,6 +68,6 @@
5668
"severity": "MODERATE",
5769
"github_reviewed": true,
5870
"github_reviewed_at": "2026-03-02T23:23:03Z",
59-
"nvd_published_at": null
71+
"nvd_published_at": "2026-03-05T22:16:23Z"
6072
}
6173
}

0 commit comments

Comments
 (0)