Skip to content

Commit 50fa218

Browse files
1 parent fb0452a commit 50fa218

8 files changed

Lines changed: 65 additions & 21 deletions

File tree

advisories/github-reviewed/2026/03/GHSA-56px-hm34-xqj5/GHSA-56px-hm34-xqj5.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-56px-hm34-xqj5",
4-
"modified": "2026-03-11T14:49:37Z",
4+
"modified": "2026-03-11T20:43:29Z",
55
"published": "2026-03-11T14:49:37Z",
66
"aliases": [
77
"CVE-2026-28229"
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://github.com/argoproj/argo-workflows/security/advisories/GHSA-56px-hm34-xqj5"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28229"
65+
},
6266
{
6367
"type": "WEB",
6468
"url": "https://github.com/argoproj/argo-workflows/commit/34afaf9c0c36f1ba8645d483ea4752cfc4a391e8"
@@ -78,11 +82,12 @@
7882
],
7983
"database_specific": {
8084
"cwe_ids": [
81-
"CWE-200"
85+
"CWE-200",
86+
"CWE-863"
8287
],
8388
"severity": "HIGH",
8489
"github_reviewed": true,
8590
"github_reviewed_at": "2026-03-11T14:49:37Z",
86-
"nvd_published_at": null
91+
"nvd_published_at": "2026-03-11T16:16:40Z"
8792
}
8893
}

advisories/github-reviewed/2026/03/GHSA-8q2w-wr49-whqj/GHSA-8q2w-wr49-whqj.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8q2w-wr49-whqj",
4-
"modified": "2026-03-11T14:49:44Z",
4+
"modified": "2026-03-11T20:43:35Z",
55
"published": "2026-03-11T14:49:44Z",
66
"aliases": [
77
"CVE-2026-29777"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://github.com/traefik/traefik/security/advisories/GHSA-8q2w-wr49-whqj"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29777"
49+
},
4650
{
4751
"type": "PACKAGE",
4852
"url": "https://github.com/traefik/traefik"
@@ -59,6 +63,6 @@
5963
"severity": "MODERATE",
6064
"github_reviewed": true,
6165
"github_reviewed_at": "2026-03-11T14:49:44Z",
62-
"nvd_published_at": null
66+
"nvd_published_at": "2026-03-11T16:16:40Z"
6367
}
6468
}

advisories/github-reviewed/2026/03/GHSA-fp5j-j7j4-mcxc/GHSA-fp5j-j7j4-mcxc.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fp5j-j7j4-mcxc",
4-
"modified": "2026-03-11T14:56:45Z",
4+
"modified": "2026-03-11T20:44:40Z",
55
"published": "2026-03-11T14:56:45Z",
66
"aliases": [
77
"CVE-2026-31857"
@@ -65,6 +65,10 @@
6565
"type": "WEB",
6666
"url": "https://github.com/craftcms/cms/security/advisories/GHSA-fp5j-j7j4-mcxc"
6767
},
68+
{
69+
"type": "ADVISORY",
70+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31857"
71+
},
6872
{
6973
"type": "WEB",
7074
"url": "https://github.com/craftcms/cms/commit/8d4903647dcfd31b8d40ed027e27082013347a80"
@@ -81,6 +85,6 @@
8185
"severity": "HIGH",
8286
"github_reviewed": true,
8387
"github_reviewed_at": "2026-03-11T14:56:45Z",
84-
"nvd_published_at": null
88+
"nvd_published_at": "2026-03-11T18:16:24Z"
8589
}
8690
}

advisories/github-reviewed/2026/03/GHSA-fvwq-45qv-xvhv/GHSA-fvwq-45qv-xvhv.json

Lines changed: 13 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,19 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fvwq-45qv-xvhv",
4-
"modified": "2026-03-11T00:26:13Z",
4+
"modified": "2026-03-11T20:44:34Z",
55
"published": "2026-03-11T00:26:13Z",
66
"aliases": [
77
"CVE-2026-31859"
88
],
99
"summary": "CraftCMS vulnerable to reflective XSS via incomplete return URL sanitization",
1010
"details": "### Summary\n\nThe fix for CVE-2025-35939 in `craftcms/cms` introduced a `strip_tags()` call in `src/web/User.php` to sanitize return URLs before they are stored in the session. However, `strip_tags()` only removes HTML tags (angle brackets) -- it does not inspect or filter URL schemes. Payloads like `javascript:alert(document.cookie)` contain no HTML tags and pass through `strip_tags()` completely unmodified, enabling reflected XSS when the return URL is rendered in an `href` attribute.\n\n### Details\nThe patched code in is:\n\n```php\npublic function setReturnUrl($url): void\n{\n parent::setReturnUrl(strip_tags($url));\n}\n```\n\n`strip_tags()` removes HTML tags (e.g., `<script>`, `<img>`) from a string, but it is **not** a URL sanitizer. When the sanitized return URL is subsequently rendered in an `href` attribute context (e.g., `<a href=\"{{ returnUrl }}\">`), the following dangerous payloads survive `strip_tags()` completely unmodified:\n\n1. **`javascript:` protocol URLs** -- `javascript:alert(document.cookie)` contains no HTML tags, so `strip_tags()` returns it verbatim. When placed in an `href`, clicking the link executes the JavaScript.\n\n2. **`data:` URIs** -- `data:text/html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==` uses Base64 encoding and contains no tags at all, bypassing `strip_tags()` entirely.\n\n3. **Protocol-relative URLs** -- `//evil.com/steal` contains no tags and is passed through unchanged. When rendered as an `href`, the browser resolves it relative to the current page’s protocol, redirecting the user to an attacker-controlled domain.\n\nThe core issue is that `strip_tags()` operates on HTML syntax (angle brackets) while the threat model here requires URL scheme validation. These are fundamentally different security concerns.\n\n### Impact\n\n**Reflected XSS via crafted return URL.** An attacker constructs a malicious link such as `https://target.example.com/craft/?returnUrl=javascript:alert(document.cookie)` and sends it to a victim. The attack flow is:\n\n1. Victim clicks the link, visiting the Craft CMS site.\n2. The application calls `setReturnUrl()` with the attacker-controlled value.\n3. `strip_tags()` processes the URL but finds no HTML tags -- it passes through unchanged.\n4. The URL is stored in the session and later rendered in an `href` attribute (e.g., a \"Return\" or \"Continue\" link).\n5. When the victim clicks that link, `javascript:alert(document.cookie)` executes in the context of the Craft CMS origin.\n\nThis enables:\n- **Session hijacking** via cookie theft (`document.cookie`)\n- **Data exfiltration** via `fetch()` to an attacker-controlled server\n- **Phishing** by redirecting to a lookalike domain (protocol-relative URL)\n- **CSRF** by performing actions on behalf of the authenticated user",
11-
"severity": [],
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"
15+
}
16+
],
1217
"affected": [
1318
{
1419
"package": {
@@ -60,6 +65,10 @@
6065
"type": "WEB",
6166
"url": "https://github.com/craftcms/cms/security/advisories/GHSA-fvwq-45qv-xvhv"
6267
},
68+
{
69+
"type": "ADVISORY",
70+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31859"
71+
},
6372
{
6473
"type": "WEB",
6574
"url": "https://github.com/craftcms/cms/commit/cc9921c14897ee2b592a431c2356af8a04ce4cfe"
@@ -74,9 +83,9 @@
7483
"CWE-116",
7584
"CWE-79"
7685
],
77-
"severity": "LOW",
86+
"severity": "MODERATE",
7887
"github_reviewed": true,
7988
"github_reviewed_at": "2026-03-11T00:26:13Z",
80-
"nvd_published_at": null
89+
"nvd_published_at": "2026-03-11T18:16:24Z"
8190
}
8291
}

advisories/github-reviewed/2026/03/GHSA-g7j6-fmwx-7vp8/GHSA-g7j6-fmwx-7vp8.json

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,19 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g7j6-fmwx-7vp8",
4-
"modified": "2026-03-11T00:27:23Z",
4+
"modified": "2026-03-11T20:45:01Z",
55
"published": "2026-03-11T00:27:23Z",
66
"aliases": [
77
"CVE-2026-31858"
88
],
99
"summary": "CraftCMS's `ElementSearchController` Affected by Blind SQL Injection",
1010
"details": "The `ElementSearchController::actionSearch()` endpoint is missing the `unset()` protection that\nwas added to ElementIndexesController in [GHSA-2453-mppf-46cj](https://github.com/craftcms/cms/security/advisories/GHSA-2453-mppf-46cj).\n\nThe exact same SQL injection vulnerability (including `criteria[orderBy]`, the original advisory vector) works on this controller because the fix was never applied to it.\n\nAny authenticated control panel user (no admin required) can inject arbitrary SQL via `criteria[where]`,\n`criteria[orderBy]`, or other query properties, and extract the full database contents via boolean-based blind injection.\n\nUsers should update to the patched 5.9.9 release to mitigate the issue.",
11-
"severity": [],
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
15+
}
16+
],
1217
"affected": [
1318
{
1419
"package": {
@@ -42,6 +47,10 @@
4247
"type": "WEB",
4348
"url": "https://github.com/craftcms/cms/security/advisories/GHSA-g7j6-fmwx-7vp8"
4449
},
50+
{
51+
"type": "ADVISORY",
52+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31858"
53+
},
4554
{
4655
"type": "WEB",
4756
"url": "https://github.com/craftcms/cms/commit/e1a3dd669ae31491b86ad996e88a1d30d33d9a42"
@@ -58,6 +67,6 @@
5867
"severity": "HIGH",
5968
"github_reviewed": true,
6069
"github_reviewed_at": "2026-03-11T00:27:23Z",
61-
"nvd_published_at": null
70+
"nvd_published_at": "2026-03-11T18:16:24Z"
6271
}
6372
}

advisories/github-reviewed/2026/03/GHSA-mmf8-487q-p45m/GHSA-mmf8-487q-p45m.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-mmf8-487q-p45m",
4-
"modified": "2026-03-11T14:55:49Z",
4+
"modified": "2026-03-11T20:43:41Z",
55
"published": "2026-03-11T14:55:49Z",
66
"aliases": [
77
"CVE-2026-31839"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/striae-org/striae/security/advisories/GHSA-mmf8-487q-p45m"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31839"
46+
},
4347
{
4448
"type": "PACKAGE",
4549
"url": "https://github.com/striae-org/striae"
@@ -52,11 +56,12 @@
5256
"database_specific": {
5357
"cwe_ids": [
5458
"CWE-327",
55-
"CWE-353"
59+
"CWE-353",
60+
"CWE-354"
5661
],
5762
"severity": "HIGH",
5863
"github_reviewed": true,
5964
"github_reviewed_at": "2026-03-11T14:55:49Z",
60-
"nvd_published_at": null
65+
"nvd_published_at": "2026-03-11T17:16:58Z"
6166
}
6267
}

advisories/github-reviewed/2026/03/GHSA-q3vj-96h2-gwvg/GHSA-q3vj-96h2-gwvg.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-q3vj-96h2-gwvg",
4-
"modified": "2026-03-11T00:26:37Z",
4+
"modified": "2026-03-11T20:44:45Z",
55
"published": "2026-03-11T00:26:37Z",
66
"aliases": [
77
"CVE-2026-31856"
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-q3vj-96h2-gwvg"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31856"
65+
},
6266
{
6367
"type": "PACKAGE",
6468
"url": "https://github.com/parse-community/parse-server"
@@ -79,6 +83,6 @@
7983
"severity": "CRITICAL",
8084
"github_reviewed": true,
8185
"github_reviewed_at": "2026-03-11T00:26:37Z",
82-
"nvd_published_at": null
86+
"nvd_published_at": "2026-03-11T18:16:24Z"
8387
}
8488
}

advisories/github-reviewed/2026/03/GHSA-qpr4-jrj4-6f27/GHSA-qpr4-jrj4-6f27.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qpr4-jrj4-6f27",
4-
"modified": "2026-03-10T18:25:27Z",
4+
"modified": "2026-03-11T20:44:07Z",
55
"published": "2026-03-10T18:25:27Z",
66
"aliases": [
77
"CVE-2026-31840"
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://github.com/parse-community/parse-server/security/advisories/GHSA-qpr4-jrj4-6f27"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31840"
65+
},
6266
{
6367
"type": "PACKAGE",
6468
"url": "https://github.com/parse-community/parse-server"
@@ -79,6 +83,6 @@
7983
"severity": "CRITICAL",
8084
"github_reviewed": true,
8185
"github_reviewed_at": "2026-03-10T18:25:27Z",
82-
"nvd_published_at": null
86+
"nvd_published_at": "2026-03-11T17:16:58Z"
8387
}
8488
}

0 commit comments

Comments
 (0)