Skip to content

Commit 87195fc

Browse files

File tree

5 files changed

+174
-19
lines changed

5 files changed

+174
-19
lines changed

advisories/unreviewed/2026/04/GHSA-2xx8-j85v-j7wh/GHSA-2xx8-j85v-j7wh.json renamed to advisories/github-reviewed/2026/04/GHSA-2xx8-j85v-j7wh/GHSA-2xx8-j85v-j7wh.json

Lines changed: 26 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2xx8-j85v-j7wh",
4-
"modified": "2026-04-14T18:30:35Z",
4+
"modified": "2026-04-16T01:32:19Z",
55
"published": "2026-04-14T18:30:35Z",
66
"aliases": [
77
"CVE-2026-38532"
88
],
9+
"summary": "Webkul Krayin CRM has Broken Object-Level Authorization (BOLA) in the /Contact/Persons/PersonController.php",
910
"details": "A Broken Object-Level Authorization (BOLA) in the /Contact/Persons/PersonController.php endpoint of Webkul Krayin CRM v2.2.x allows authenticated attackers to arbitrarily read, modify, and permanently delete any contact owned by other users via supplying a crafted GET request.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "krayin/laravel-crm"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "2.2.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -24,7 +45,7 @@
2445
"url": "https://github.com/TREXNEGRO/Security-Advisories/tree/main/CVE-2026-38532"
2546
},
2647
{
27-
"type": "WEB",
48+
"type": "PACKAGE",
2849
"url": "https://github.com/krayin/laravel-crm"
2950
}
3051
],
@@ -33,8 +54,8 @@
3354
"CWE-639"
3455
],
3556
"severity": "HIGH",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
57+
"github_reviewed": true,
58+
"github_reviewed_at": "2026-04-16T01:32:19Z",
3859
"nvd_published_at": "2026-04-14T16:16:43Z"
3960
}
4061
}

advisories/unreviewed/2026/04/GHSA-3qcm-pj6q-w4c5/GHSA-3qcm-pj6q-w4c5.json renamed to advisories/github-reviewed/2026/04/GHSA-3qcm-pj6q-w4c5/GHSA-3qcm-pj6q-w4c5.json

Lines changed: 30 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3qcm-pj6q-w4c5",
4-
"modified": "2026-04-04T21:30:27Z",
4+
"modified": "2026-04-16T01:34:08Z",
55
"published": "2026-04-04T21:30:27Z",
66
"aliases": [
77
"CVE-2016-20054"
88
],
9+
"summary": "Nodcms contains a cross-site request forgery vulnerability",
910
"details": "Nodcms contains a cross-site request forgery vulnerability that allows attackers to perform unauthorized administrative actions by crafting malicious forms. Attackers can trick authenticated administrators into submitting requests to admin/user_manipulate and admin/settings/generall endpoints to create users or modify application settings without explicit consent.",
1011
"severity": [
1112
{
@@ -14,15 +15,39 @@
1415
},
1516
{
1617
"type": "CVSS_V4",
17-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "Packagist",
25+
"name": "khodakhah/nodcms"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"last_affected": "3.4.1"
36+
}
37+
]
38+
}
39+
]
1840
}
1941
],
20-
"affected": [],
2142
"references": [
2243
{
2344
"type": "ADVISORY",
2445
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-20054"
2546
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/khodakhah/nodcms"
50+
},
2651
{
2752
"type": "WEB",
2853
"url": "https://www.exploit-db.com/exploits/40707"
@@ -34,8 +59,8 @@
3459
"CWE-79"
3560
],
3661
"severity": "MODERATE",
37-
"github_reviewed": false,
38-
"github_reviewed_at": null,
62+
"github_reviewed": true,
63+
"github_reviewed_at": "2026-04-16T01:34:08Z",
3964
"nvd_published_at": "2026-04-04T20:16:15Z"
4065
}
4166
}
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-5vjq-5jmg-39xq",
4+
"modified": "2026-04-16T01:34:40Z",
5+
"published": "2026-04-16T01:34:39Z",
6+
"aliases": [],
7+
"summary": "Renovate affected by remote code execution was possible using the bazel-module or bazelisk managers, when using lockFileMaintenance",
8+
"details": "When using [`lockFileMaintenance`](https://docs.renovatebot.com/configuration-options/#lockfilemaintenance) using the [bazel-module](https://docs.renovatebot.com/modules/manager/bazel-module/) or [bazelisk](https://docs.renovatebot.com/modules/manager/bazelisk/) managers between Renovate [43.65.0](https://github.com/renovatebot/renovate/releases/tag/43.65.0) (2026-03-12) and [43.102.11](https://github.com/renovatebot/renovate/releases/tag/43.102.11) (2026-04-02), there was the opportunity for remote code execution from a malicious dependency, _if the Bazel module executes code that relies on a dependency_.\n\nAs this is an \"unsafe\" execution path, we have disabled this by default, and self-hosted administrators must add it to the [`allowedUnsafeExecutions`](https://docs.renovatebot.com/self-hosted-configuration/#allowedunsafeexecutions) allowlist.\n\nIt is recommended to review whether you have enabled this functionality for these managers, and if so, whether any dependency updates may have led to remote code execution.\n\n## Impact\n\nIf Renovate suggested an update to a malicious dependency, _and_ that dependency is referenced as part of the `bazel mod deps` call - for instance as part of a `ctx.execute` call - this would call attacker-controlled code.\n\nThis could lead to [insider attackers](https://docs.renovatebot.com/security-and-permissions/#execution-of-code-insider-attack) and [outside attackers](https://docs.renovatebot.com/security-and-permissions/#execution-of-code-outsider-attack), executing code that is distributed as part of the package.\n \n## Patches\n\nThis is patched in [43.102.11](https://github.com/renovatebot/renovate/releases/tag/43.102.11).\n\nThis does not affect any versions of [Mend Renovate Self-Hosted](https://www.mend.io/renovate/).\n\n## Workarounds\n\n- Upgrade your Renovate version\n- Disable `lockFileMaintenance` for these managers\n\n## Why did this happen?\n\nThis was missed in code review (as part of https://github.com/renovatebot/renovate/pull/41507).",
9+
"severity": [
10+
{
11+
"type": "CVSS_V3",
12+
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "npm",
19+
"name": "renovate"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "43.65.0"
27+
},
28+
{
29+
"fixed": "43.102.11"
30+
}
31+
]
32+
}
33+
]
34+
}
35+
],
36+
"references": [
37+
{
38+
"type": "WEB",
39+
"url": "https://github.com/renovatebot/renovate/security/advisories/GHSA-5vjq-5jmg-39xq"
40+
},
41+
{
42+
"type": "PACKAGE",
43+
"url": "https://github.com/renovatebot/renovate"
44+
},
45+
{
46+
"type": "WEB",
47+
"url": "https://github.com/renovatebot/renovate/releases/tag/43.102.11"
48+
}
49+
],
50+
"database_specific": {
51+
"cwe_ids": [
52+
"CWE-94"
53+
],
54+
"severity": "MODERATE",
55+
"github_reviewed": true,
56+
"github_reviewed_at": "2026-04-16T01:34:39Z",
57+
"nvd_published_at": null
58+
}
59+
}

advisories/unreviewed/2026/04/GHSA-fpx9-9hq8-w2xc/GHSA-fpx9-9hq8-w2xc.json renamed to advisories/github-reviewed/2026/04/GHSA-fpx9-9hq8-w2xc/GHSA-fpx9-9hq8-w2xc.json

Lines changed: 26 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fpx9-9hq8-w2xc",
4-
"modified": "2026-04-14T18:30:35Z",
4+
"modified": "2026-04-16T01:32:29Z",
55
"published": "2026-04-14T18:30:35Z",
66
"aliases": [
77
"CVE-2026-38527"
88
],
9+
"summary": "Webkul Krayin CRM has Server-Side Request Forgery (SSRF)",
910
"details": "A Server-Side Request Forgery (SSRF) in the /settings/webhooks/create component of Webkul Krayin CRM v2.2.x allows attackers to scan internal resources via supplying a crafted POST request.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "krayin/laravel-crm"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "2.2.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -24,7 +45,7 @@
2445
"url": "https://github.com/TREXNEGRO/Security-Advisories/tree/main/CVE-2026-38527"
2546
},
2647
{
27-
"type": "WEB",
48+
"type": "PACKAGE",
2849
"url": "https://github.com/krayin/laravel-crm"
2950
}
3051
],
@@ -33,8 +54,8 @@
3354
"CWE-918"
3455
],
3556
"severity": "HIGH",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
57+
"github_reviewed": true,
58+
"github_reviewed_at": "2026-04-16T01:32:29Z",
3859
"nvd_published_at": "2026-04-14T16:16:43Z"
3960
}
4061
}

advisories/unreviewed/2026/04/GHSA-m32f-8vh9-2hh3/GHSA-m32f-8vh9-2hh3.json renamed to advisories/github-reviewed/2026/04/GHSA-m32f-8vh9-2hh3/GHSA-m32f-8vh9-2hh3.json

Lines changed: 33 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,40 +1,69 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-m32f-8vh9-2hh3",
4-
"modified": "2026-04-14T15:30:35Z",
4+
"modified": "2026-04-16T01:34:56Z",
55
"published": "2026-04-14T15:30:35Z",
66
"aliases": [
77
"CVE-2026-37980"
88
],
9+
"summary": "Keycloak: Arbitrary code execution via Stored Cross-Site Scripting (XSS) in organization selection login page",
910
"details": "A flaw was found in Keycloak, specifically in the organization selection login page. A remote attacker with `manage-realm` or `manage-organizations` administrative privileges can exploit a Stored Cross-Site Scripting (XSS) vulnerability. This flaw occurs because the `organization.alias` is placed into an inline JavaScript `onclick` handler, allowing a crafted JavaScript payload to execute in a user's browser when they view the login page. Successful exploitation enables arbitrary JavaScript execution, potentially leading to session theft, unauthorized account actions, or further attacks against users of the affected realm.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.keycloak:keycloak-services"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "26.5.5"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-37980"
2142
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/keycloak/keycloak/issues/48049"
46+
},
2247
{
2348
"type": "WEB",
2449
"url": "https://access.redhat.com/security/cve/CVE-2026-37980"
2550
},
2651
{
2752
"type": "WEB",
2853
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455325"
54+
},
55+
{
56+
"type": "PACKAGE",
57+
"url": "https://github.com/keycloak/keycloak"
2958
}
3059
],
3160
"database_specific": {
3261
"cwe_ids": [
3362
"CWE-79"
3463
],
3564
"severity": "MODERATE",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2026-04-16T01:34:56Z",
3867
"nvd_published_at": "2026-04-14T15:16:34Z"
3968
}
4069
}

0 commit comments

Comments
 (0)