Skip to content

Commit 50f5a14

Browse files
1 parent 7000120 commit 50f5a14

4 files changed

Lines changed: 15 additions & 7 deletions

File tree

advisories/github-reviewed/2025/12/GHSA-v98v-ff95-f3cp/GHSA-v98v-ff95-f3cp.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-v98v-ff95-f3cp",
4-
"modified": "2026-01-09T16:53:15Z",
4+
"modified": "2026-03-11T20:39:31Z",
55
"published": "2025-12-22T16:19:13Z",
66
"aliases": [
77
"CVE-2025-68613"
@@ -78,6 +78,14 @@
7878
{
7979
"type": "PACKAGE",
8080
"url": "https://github.com/n8n-io/n8n"
81+
},
82+
{
83+
"type": "WEB",
84+
"url": "https://www.akamai.com/blog/security-research/2026/feb/zerobot-malware-targets-n8n-automation-platform"
85+
},
86+
{
87+
"type": "WEB",
88+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-68613"
8189
}
8290
],
8391
"database_specific": {

advisories/github-reviewed/2026/03/GHSA-4hgg-c4rr-6h7f/GHSA-4hgg-c4rr-6h7f.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4hgg-c4rr-6h7f",
4-
"modified": "2026-03-09T17:27:52Z",
4+
"modified": "2026-03-11T20:39:09Z",
55
"published": "2026-03-09T17:27:52Z",
66
"aliases": [
77
"CVE-2026-29196"
88
],
99
"summary": "Netmaker: Service User with Network Access Can Access config files with WireGuard Private Keys",
10-
"details": "A user assigned the platform-user role can retrieve WireGuard private keys of all wireguard configs in a network by calling GET /api/extclients/{network} or GET /api/nodes/{network}. While the Netmaker UI restricts visibility, the API endpoints return full records, including private keys, without filtering based on the requesting user's ownership.",
10+
"details": "A user assigned the platform-user role can retrieve WireGuard private keys of all wireguard configs in a network by calling GET /api/extclients/{network} or GET /api/nodes/{network}. While the Netmaker UI restricts visibility, the API endpoints return full records, including private keys, without filtering based on the requesting user's ownership.\n\n> Credits\n> Artem Danilov (Positive Technologies)",
1111
"severity": [
1212
{
1313
"type": "CVSS_V4",

advisories/github-reviewed/2026/03/GHSA-525j-95gf-766f/GHSA-525j-95gf-766f.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-525j-95gf-766f",
4-
"modified": "2026-03-09T19:48:12Z",
4+
"modified": "2026-03-11T20:40:06Z",
55
"published": "2026-03-09T19:48:12Z",
66
"aliases": [
77
"CVE-2026-30933"
@@ -62,6 +62,6 @@
6262
"severity": "HIGH",
6363
"github_reviewed": true,
6464
"github_reviewed_at": "2026-03-09T19:48:12Z",
65-
"nvd_published_at": null
65+
"nvd_published_at": "2026-03-10T18:18:53Z"
6666
}
6767
}

advisories/github-reviewed/2026/03/GHSA-ch3w-9456-38v3/GHSA-ch3w-9456-38v3.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-ch3w-9456-38v3",
4-
"modified": "2026-03-09T17:27:49Z",
4+
"modified": "2026-03-11T20:39:22Z",
55
"published": "2026-03-09T17:27:49Z",
66
"aliases": [
77
"CVE-2026-29195"
88
],
99
"summary": "Netmaker has Privilege Escalation from Admin to Super-Admin via User Update",
10-
"details": "The user update handler (PUT /api/users/{username}) lacks validation to prevent an admin-role user from assigning the super-admin role during account updates. While the code correctly blocks an admin from assigning the admin role to another user, it does not include an equivalent check for the super-admin role.",
10+
"details": "The user update handler (PUT /api/users/{username}) lacks validation to prevent an admin-role user from assigning the super-admin role during account updates. While the code correctly blocks an admin from assigning the admin role to another user, it does not include an equivalent check for the super-admin role.\n\n> Credits\n> Artem Danilov (Positive Technologies)",
1111
"severity": [
1212
{
1313
"type": "CVSS_V4",

0 commit comments

Comments
 (0)