Skip to content

Commit ad09a5a

Browse files
1 parent 5b4ac8e commit ad09a5a

3 files changed

Lines changed: 22 additions & 6 deletions

File tree

advisories/github-reviewed/2026/01/GHSA-f72r-2h5j-7639/GHSA-f72r-2h5j-7639.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-f72r-2h5j-7639",
4-
"modified": "2026-02-10T16:03:09Z",
4+
"modified": "2026-02-10T19:56:53Z",
55
"published": "2026-01-28T23:00:57Z",
66
"aliases": [
77
"CVE-2026-25992"
@@ -44,13 +44,21 @@
4444
"type": "WEB",
4545
"url": "https://github.com/siyuan-note/siyuan/security/advisories/GHSA-f72r-2h5j-7639"
4646
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25992"
50+
},
4751
{
4852
"type": "WEB",
4953
"url": "https://github.com/siyuan-note/siyuan/commit/1f02650b3892d2ea3896242dd2422c30bda55e11"
5054
},
5155
{
5256
"type": "PACKAGE",
5357
"url": "https://github.com/siyuan-note/siyuan"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://github.com/siyuan-note/siyuan/releases/tag/v3.5.5"
5462
}
5563
],
5664
"database_specific": {
@@ -62,6 +70,6 @@
6270
"severity": "HIGH",
6371
"github_reviewed": true,
6472
"github_reviewed_at": "2026-01-28T23:00:57Z",
65-
"nvd_published_at": null
73+
"nvd_published_at": "2026-02-10T18:16:38Z"
6674
}
6775
}

advisories/github-reviewed/2026/02/GHSA-jg68-vhv3-9r8f/GHSA-jg68-vhv3-9r8f.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jg68-vhv3-9r8f",
4-
"modified": "2026-02-05T00:34:29Z",
4+
"modified": "2026-02-10T19:58:15Z",
55
"published": "2026-02-02T23:12:57Z",
66
"aliases": [
77
"CVE-2026-25523"
88
],
99
"summary": "Magento's X-Original-Url header can expose admin url",
10-
"details": "### Impact\n\nThe admin url can be discovered without prior knowledge of its location by exploiting the X-Original-Url header on some configurations.\n\n### Patches\n\nThe bug comes from the Zend library.\n\n### Workarounds\n\nUnset the X-Original-Url header in the web server configuration.\n\n### Resources\n\nhttps://hackerone.com/bugs?subject=openmage&report_id=3416312\n\nUpon deeper investigation, it was initially not found, but then it was realized that the search excluded the vendor/ directory. This is coming from the Zend_Controller module. Here is another tip from 2016 - it is surprising that this was not somehow patched already!\n\nhttps://peterocallaghan.co.uk/2016/12/magento-poisoning-cache/ (dead link now..)\n\n### Credit\n\nAnees Hyder (anees0x_dev) on HackerOne\nhttps://hackerone.com/anees0x_dev/hacktivity?type=user",
10+
"details": "### Impact\n\nThe admin url can be discovered without prior knowledge of it's location by exploiting the X-Original-Url header on some configurations.\n\n### Patches\n\nThe bug comes from the Zend library and is patche by unsetting the header in the bootstrap process.\n\n### Workarounds\n\nUnset the `X-Original-Url` header in the web server configuration.\n\n### References\n\nThe activation of these headers is coming from the Zend_Controller module. It appears this has been known to some degree since 2016 -\nhttps://peterocallaghan.co.uk/2016/12/magento-poisoning-cache/ (dead link now..)\n\n### Credit\n\nAnees Hyder ( @anees0xdev ) via HackerOne\nhttps://hackerone.com/anees0x_dev/hacktivity",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",

advisories/github-reviewed/2026/02/GHSA-x6cr-mq53-cc76/GHSA-x6cr-mq53-cc76.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-x6cr-mq53-cc76",
4-
"modified": "2026-02-10T14:33:15Z",
4+
"modified": "2026-02-10T19:56:59Z",
55
"published": "2026-02-10T14:33:15Z",
66
"aliases": [
77
"CVE-2026-25577"
@@ -43,6 +43,14 @@
4343
"type": "WEB",
4444
"url": "https://github.com/emmett-framework/core/security/advisories/GHSA-x6cr-mq53-cc76"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25577"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://github.com/emmett-framework/core/commit/9557ea23a27cbadf7774d8bca6bbe4b54fa8a3ec"
53+
},
4654
{
4755
"type": "WEB",
4856
"url": "https://github.com/emmett-framework/core/commit/c126757133e118119a280b58f3bb345b1c9a8a2a"
@@ -60,6 +68,6 @@
6068
"severity": "HIGH",
6169
"github_reviewed": true,
6270
"github_reviewed_at": "2026-02-10T14:33:15Z",
63-
"nvd_published_at": null
71+
"nvd_published_at": "2026-02-10T18:16:37Z"
6472
}
6573
}

0 commit comments

Comments
 (0)