Skip to content

Commit 8203b6e

Browse files
1 parent bcde3db commit 8203b6e

5 files changed

Lines changed: 47 additions & 12 deletions

File tree

advisories/github-reviewed/2026/02/GHSA-qj77-c3c8-9c3q/GHSA-qj77-c3c8-9c3q.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qj77-c3c8-9c3q",
4-
"modified": "2026-03-05T21:40:42Z",
4+
"modified": "2026-03-10T18:41:42Z",
55
"published": "2026-02-17T16:44:11Z",
66
"aliases": [
77
"CVE-2026-28391"
88
],
99
"summary": "OpenClaw's Windows cmd.exe parsing may bypass exec allowlist/approval gating",
1010
"details": "### Summary\n\nOn Windows nodes, exec requests were executed via `cmd.exe /d /s /c <rawCommand>`. In allowlist/approval-gated mode, the allowlist analysis did not model Windows `cmd.exe` parsing and metacharacter behavior. A crafted command string could cause `cmd.exe` to interpret additional operations (for example command chaining via `&`, or expansion via `%...%` / `!...!`) beyond what was allowlisted/approved.\n\n### Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Affected: `<= 2026.2.1`\n- Patched: `>= 2026.2.2`\n- Latest (npm) as of 2026-02-14: `2026.2.13`\n\n### Details\n\n- Default installs: Not affected unless you opt into exec allowlist/approval gating on Windows nodes.\n- Windows execution uses `cmd.exe` via `src/infra/node-shell.ts`.\n- The fix hardens Windows allowlist enforcement by:\n - Passing the platform into allowlist analysis and rejecting Windows shell metacharacters.\n - Treating `cmd.exe` invocation as not allowlist-safe on Windows.\n - Avoiding `cmd.exe` entirely in allowlist mode by executing the parsed argv directly when possible.\n\n### Fix Commit(s)\n\n- `a7f4a53ce80c98ba1452eb90802d447fca9bf3d6`\n\nThanks @simecek for reporting.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
15+
},
1216
{
1317
"type": "CVSS_V4",
1418
"score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
@@ -40,6 +44,10 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-qj77-c3c8-9c3q"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28391"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/commit/a7f4a53ce80c98ba1452eb90802d447fca9bf3d6"
@@ -51,6 +59,10 @@
5159
{
5260
"type": "WEB",
5361
"url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.2"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://www.vulncheck.com/advisories/openclaw-command-injection-via-cmdexe-parsing-bypass-in-allowlist-enforcement"
5466
}
5567
],
5668
"database_specific": {
@@ -60,6 +72,6 @@
6072
"severity": "HIGH",
6173
"github_reviewed": true,
6274
"github_reviewed_at": "2026-02-17T16:44:11Z",
63-
"nvd_published_at": null
75+
"nvd_published_at": "2026-03-05T22:16:15Z"
6476
}
6577
}

advisories/github-reviewed/2026/02/GHSA-v773-r54f-q32w/GHSA-v773-r54f-q32w.json

Lines changed: 17 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-v773-r54f-q32w",
4-
"modified": "2026-03-05T21:41:05Z",
4+
"modified": "2026-03-10T18:42:17Z",
55
"published": "2026-02-18T00:51:03Z",
66
"aliases": [
77
"CVE-2026-28392"
@@ -12,6 +12,10 @@
1212
{
1313
"type": "CVSS_V3",
1414
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -40,6 +44,10 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v773-r54f-q32w"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28392"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/commit/f19eabee54c49e9a2e264b4965edf28a2f92e657"
@@ -51,15 +59,20 @@
5159
{
5260
"type": "WEB",
5361
"url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://www.vulncheck.com/advisories/openclaw-privilege-escalation-in-slack-slash-command-handler-via-direct-messages"
5466
}
5567
],
5668
"database_specific": {
5769
"cwe_ids": [
58-
"CWE-285"
70+
"CWE-285",
71+
"CWE-863"
5972
],
60-
"severity": "MODERATE",
73+
"severity": "HIGH",
6174
"github_reviewed": true,
6275
"github_reviewed_at": "2026-02-18T00:51:03Z",
63-
"nvd_published_at": null
76+
"nvd_published_at": "2026-03-05T22:16:15Z"
6477
}
6578
}

advisories/github-reviewed/2026/02/GHSA-whrj-4476-wvmp/GHSA-whrj-4476-wvmp.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-whrj-4476-wvmp",
4-
"modified": "2026-02-24T16:06:42Z",
4+
"modified": "2026-03-10T18:41:32Z",
55
"published": "2026-02-17T18:46:35Z",
66
"aliases": [
77
"CVE-2026-25500"
88
],
99
"summary": "Stored XSS in Rack::Directory via javascript: filenames rendered into anchor href",
10-
"details": "## Summary\n\n`Rack::Directory` generates an HTML directory index where each file entry is rendered as a clickable link. If a file exists on disk whose basename begins with the `javascript:` scheme (e.g. `javascript:alert(1)`), the generated index includes an anchor whose `href` attribute is exactly `javascript:alert(1)`. Clicking this entry executes arbitrary JavaScript in the context of the hosting application.\n\nThis results in a client-side XSS condition in directory listings generated by `Rack::Directory`.\n\n## Details\n\n`Rack::Directory` renders directory entries using an HTML row template similar to:\n\n```html\n<a href='%s'>%s</a>\n```\n\nThe `%s` placeholder is populated directly with the file’s basename. If the basename begins with `javascript:`, the resulting HTML contains an executable JavaScript URL:\n\n```html\n<a href='javascript:alert(1)'>javascript:alert(1)</a>\n```\n\nBecause the value is inserted directly into the `href` attribute without scheme validation or normalization, browsers interpret it as a JavaScript URI. When a user clicks the link, the JavaScript executes in the origin of the Rack application.\n\n## Impact\n\nIf `Rack::Directory` is used to expose filesystem contents over HTTP, an attacker who can create or upload files within that directory may introduce a malicious filename beginning with `javascript:`.\n\nWhen a user visits the directory listing and clicks the entry, arbitrary JavaScript executes in the application's origin. Exploitation requires user interaction (clicking the malicious entry).\n\n## Mitigation\n\n* Update to a patched version of Rack in which `Rack::Directory` prefixes generated anchors with a relative path indicator (e.g. `./filename`).\n* Avoid exposing user-controlled directories via `Rack::Directory`.\n* Apply a strict Content Security Policy (CSP) to reduce impact of potential client-side execution issues.\n* Where feasible, restrict or sanitize uploaded filenames to disallow dangerous URI scheme prefixes.",
10+
"details": "## Summary\n\n`Rack::Directory` generates an HTML directory index where each file entry is rendered as a clickable link. If a file exists on disk whose basename begins with the `javascript:` scheme (e.g. `javascript:alert(1)`), the generated index includes an anchor whose `href` attribute is exactly `javascript:alert(1)`. Clicking this entry executes arbitrary JavaScript in the context of the hosting application.\n\nThis results in a client-side XSS condition in directory listings generated by `Rack::Directory`.\n\n## Details\n\n`Rack::Directory` renders directory entries using an HTML row template similar to:\n\n```html\n<a href='%s'>%s</a>\n```\n\nThe `%s` placeholder is populated directly with the file’s basename. If the basename begins with `javascript:`, the resulting HTML contains an executable JavaScript URL:\n\n```html\n<a href='javascript:alert(1)'>javascript:alert(1)</a>\n```\n\nBecause the value is inserted directly into the `href` attribute without scheme validation or normalization, browsers interpret it as a JavaScript URI. When a user clicks the link, the JavaScript executes in the origin of the Rack application.\n\n## Impact\n\nIf `Rack::Directory` is used to expose filesystem contents over HTTP, an attacker who can create or upload files within that directory may introduce a malicious filename beginning with `javascript:`.\n\nWhen a user visits the directory listing and clicks the entry, arbitrary JavaScript executes in the application's origin. Exploitation requires user interaction (clicking the malicious entry).\n\n## Mitigation\n\n* Update to a patched version of Rack in which `Rack::Directory` prefixes generated anchors with a relative path indicator (e.g. `./filename`).\n* Avoid exposing user-controlled directories via `Rack::Directory`.\n* Apply a strict Content Security Policy (CSP) to reduce impact of potential client-side execution issues.\n* Where feasible, restrict or sanitize uploaded filenames to disallow dangerous URI scheme prefixes.\n\nHackerOne profile:\nhttps://hackerone.com/thesmartshadow\n\nGitHub account owner:\nAli Firas (@thesmartshadow)",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",

advisories/github-reviewed/2026/03/GHSA-9c4h-pwmf-m6fj/GHSA-9c4h-pwmf-m6fj.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9c4h-pwmf-m6fj",
4-
"modified": "2026-03-10T01:19:29Z",
4+
"modified": "2026-03-10T18:40:24Z",
55
"published": "2026-03-10T01:19:29Z",
66
"aliases": [
77
"CVE-2026-30960"
@@ -40,13 +40,21 @@
4040
"type": "WEB",
4141
"url": "https://github.com/Apich-Organization/rssn/security/advisories/GHSA-9c4h-pwmf-m6fj"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-30960"
46+
},
4347
{
4448
"type": "PACKAGE",
4549
"url": "https://github.com/Apich-Organization/rssn"
4650
},
4751
{
4852
"type": "WEB",
4953
"url": "https://github.com/Apich-Organization/rssn/releases/tag/v0.2.9"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://rustsec.org/advisories/RUSTSEC-2026-0038.html"
5058
}
5159
],
5260
"database_specific": {
@@ -61,6 +69,6 @@
6169
"severity": "CRITICAL",
6270
"github_reviewed": true,
6371
"github_reviewed_at": "2026-03-10T01:19:29Z",
64-
"nvd_published_at": null
72+
"nvd_published_at": "2026-03-10T18:18:55Z"
6573
}
6674
}

advisories/github-reviewed/2026/03/GHSA-v53h-f6m7-xcgm/GHSA-v53h-f6m7-xcgm.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-v53h-f6m7-xcgm",
4-
"modified": "2026-03-07T02:32:27Z",
4+
"modified": "2026-03-10T18:40:35Z",
55
"published": "2026-03-07T02:32:27Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2026-31900"
8+
],
79
"summary": "Black's vulnerable version parsing leads to RCE in GitHub Action",
810
"details": "### Impact\n\nBlack provides a [GitHub action](https://black.readthedocs.io/en/stable/integrations/github_actions.html) for formatting code. This action supports an option, `use_pyproject: true`, for reading the version of Black to use from the repository `pyproject.toml`. A malicious pull request could edit pyproject.toml to use a direct URL reference to a malicious repository. This could lead to arbitrary code execution in the context of the GitHub Action. Attackers could then gain access to secrets or permissions available in the context of the action.\n\n### Patches\n\nVersion 26.3.0 fixes this vulnerability by tightening the validation of the `version` field. Users who use the GitHub Action as `psf/black@stable` will automatically pick up this update.\n\n### Workarounds\n\nDo not use the `use_pyproject: true` option in the psf/black GitHub Action.",
911
"severity": [

0 commit comments

Comments
 (0)