File tree Expand file tree Collapse file tree 9 files changed +137
-25
lines changed
advisories/github-reviewed/2026 Expand file tree Collapse file tree 9 files changed +137
-25
lines changed Original file line number Diff line number Diff line change 11{
22 "schema_version" : " 1.4.0" ,
33 "id" : " GHSA-3m3q-x3gj-f79x" ,
4- "modified" : " 2026-03-05T21:48:53Z " ,
4+ "modified" : " 2026-03-06T01:01:21Z " ,
55 "published" : " 2026-02-17T21:31:58Z" ,
66 "aliases" : [
77 " CVE-2026-28465"
1212 {
1313 "type" : " CVSS_V3" ,
1414 "score" : " CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
15+ },
16+ {
17+ "type" : " CVSS_V4" ,
18+ "score" : " CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"
1519 }
1620 ],
1721 "affected" : [
5963 "type" : " WEB" ,
6064 "url" : " https://github.com/openclaw/openclaw/security/advisories/GHSA-3m3q-x3gj-f79x"
6165 },
66+ {
67+ "type" : " ADVISORY" ,
68+ "url" : " https://nvd.nist.gov/vuln/detail/CVE-2026-28465"
69+ },
6270 {
6371 "type" : " WEB" ,
6472 "url" : " https://github.com/openclaw/openclaw/commit/a749db9820eb6d6224032a5a34223d286d2dcc2f"
7078 {
7179 "type" : " WEB" ,
7280 "url" : " https://github.com/openclaw/openclaw/releases/tag/v2026.2.3"
81+ },
82+ {
83+ "type" : " WEB" ,
84+ "url" : " https://www.vulncheck.com/advisories/openclaw-voice-call-webhook-verification-bypass-via-forwarded-headers"
7385 }
7486 ],
7587 "database_specific" : {
7688 "cwe_ids" : [
77- " CWE-287"
89+ " CWE-287" ,
90+ " CWE-345"
7891 ],
79- "severity" : " MODERATE " ,
92+ "severity" : " HIGH " ,
8093 "github_reviewed" : true ,
8194 "github_reviewed_at" : " 2026-02-17T21:31:58Z" ,
82- "nvd_published_at" : null
95+ "nvd_published_at" : " 2026-03-05T22:16:19Z "
8396 }
8497}
Original file line number Diff line number Diff line change 11{
22 "schema_version" : " 1.4.0" ,
33 "id" : " GHSA-64qx-vpxx-mvqf" ,
4- "modified" : " 2026-03-05T21:47:27Z " ,
4+ "modified" : " 2026-03-06T01:00:19Z " ,
55 "published" : " 2026-02-17T16:43:51Z" ,
66 "aliases" : [
77 " CVE-2026-28459"
1212 {
1313 "type" : " CVSS_V3" ,
1414 "score" : " CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
15+ },
16+ {
17+ "type" : " CVSS_V4" ,
18+ "score" : " CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N"
1519 }
1620 ],
1721 "affected" : [
4044 "type" : " WEB" ,
4145 "url" : " https://github.com/openclaw/openclaw/security/advisories/GHSA-64qx-vpxx-mvqf"
4246 },
47+ {
48+ "type" : " ADVISORY" ,
49+ "url" : " https://nvd.nist.gov/vuln/detail/CVE-2026-28459"
50+ },
4351 {
4452 "type" : " WEB" ,
4553 "url" : " https://github.com/openclaw/openclaw/commit/25950bcbb8ba4d8cde002557f6e27c219ae4deda"
5563 {
5664 "type" : " WEB" ,
5765 "url" : " https://github.com/openclaw/openclaw/releases/tag/v2026.2.12"
66+ },
67+ {
68+ "type" : " WEB" ,
69+ "url" : " https://www.vulncheck.com/advisories/openclaw-arbitrary-file-write-via-untrusted-sessionfile-path"
5870 }
5971 ],
6072 "database_specific" : {
6779 "severity" : " HIGH" ,
6880 "github_reviewed" : true ,
6981 "github_reviewed_at" : " 2026-02-17T16:43:51Z" ,
70- "nvd_published_at" : null
82+ "nvd_published_at" : " 2026-03-05T22:16:18Z "
7183 }
7284}
Original file line number Diff line number Diff line change 11{
22 "schema_version" : " 1.4.0" ,
33 "id" : " GHSA-7vwx-582j-j332" ,
4- "modified" : " 2026-03-05T21:54:43Z " ,
4+ "modified" : " 2026-03-06T01:02:00Z " ,
55 "published" : " 2026-02-17T21:38:14Z" ,
66 "aliases" : [
77 " CVE-2026-28481"
1212 {
1313 "type" : " CVSS_V3" ,
1414 "score" : " CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"
15+ },
16+ {
17+ "type" : " CVSS_V4" ,
18+ "score" : " CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
1519 }
1620 ],
1721 "affected" : [
4044 "type" : " WEB" ,
4145 "url" : " https://github.com/openclaw/openclaw/security/advisories/GHSA-7vwx-582j-j332"
4246 },
47+ {
48+ "type" : " ADVISORY" ,
49+ "url" : " https://nvd.nist.gov/vuln/detail/CVE-2026-28481"
50+ },
4351 {
4452 "type" : " WEB" ,
4553 "url" : " https://github.com/openclaw/openclaw/commit/41cc5bcd4f1d434ad1bbdfa55b56f25025ecbf6b"
5159 {
5260 "type" : " WEB" ,
5361 "url" : " https://github.com/openclaw/openclaw/releases/tag/v2026.2.1"
62+ },
63+ {
64+ "type" : " WEB" ,
65+ "url" : " https://www.vulncheck.com/advisories/openclaw-bearer-token-leakage-via-ms-teams-attachment-downloader-suffix-matching"
5466 }
5567 ],
5668 "database_specific" : {
5769 "cwe_ids" : [
5870 " CWE-201"
5971 ],
60- "severity" : " HIGH " ,
72+ "severity" : " MODERATE " ,
6173 "github_reviewed" : true ,
6274 "github_reviewed_at" : " 2026-02-17T21:38:14Z" ,
63- "nvd_published_at" : null
75+ "nvd_published_at" : " 2026-03-05T22:16:22Z "
6476 }
6577}
Original file line number Diff line number Diff line change 11{
22 "schema_version" : " 1.4.0" ,
33 "id" : " GHSA-rmxw-jxxx-4cpc" ,
4- "modified" : " 2026-03-05T21:51:00Z " ,
4+ "modified" : " 2026-03-06T01:01:45Z " ,
55 "published" : " 2026-02-17T21:34:17Z" ,
66 "aliases" : [
77 " CVE-2026-28471"
1212 {
1313 "type" : " CVSS_V3" ,
1414 "score" : " CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
15+ },
16+ {
17+ "type" : " CVSS_V4" ,
18+ "score" : " CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
1519 }
1620 ],
1721 "affected" : [
4044 "type" : " WEB" ,
4145 "url" : " https://github.com/openclaw/openclaw/security/advisories/GHSA-rmxw-jxxx-4cpc"
4246 },
47+ {
48+ "type" : " ADVISORY" ,
49+ "url" : " https://nvd.nist.gov/vuln/detail/CVE-2026-28471"
50+ },
4351 {
4452 "type" : " WEB" ,
4553 "url" : " https://github.com/openclaw/openclaw/commit/8f3bfbd1c4fb967a2ddb5b4b9a05784920814bcf"
5159 {
5260 "type" : " WEB" ,
5361 "url" : " https://github.com/openclaw/openclaw/releases/tag/v2026.2.2"
62+ },
63+ {
64+ "type" : " WEB" ,
65+ "url" : " https://www.vulncheck.com/advisories/openclaw-allowlist-bypass-via-displayname-and-cross-homeserver-localpart-matching-in-matrix"
5466 }
5567 ],
5668 "database_specific" : {
5769 "cwe_ids" : [
70+ " CWE-287" ,
5871 " CWE-290"
5972 ],
6073 "severity" : " MODERATE" ,
6174 "github_reviewed" : true ,
6275 "github_reviewed_at" : " 2026-02-17T21:34:17Z" ,
63- "nvd_published_at" : null
76+ "nvd_published_at" : " 2026-03-05T22:16:20Z "
6477 }
6578}
Original file line number Diff line number Diff line change 11{
22 "schema_version" : " 1.4.0" ,
33 "id" : " GHSA-v6c6-vqqg-w888" ,
4- "modified" : " 2026-03-05T21:46:11Z " ,
4+ "modified" : " 2026-03-06T00:59:44Z " ,
55 "published" : " 2026-02-18T00:57:48Z" ,
66 "aliases" : [
77 " CVE-2026-28456"
1212 {
1313 "type" : " CVSS_V3" ,
1414 "score" : " CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
15+ },
16+ {
17+ "type" : " CVSS_V4" ,
18+ "score" : " CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
1519 }
1620 ],
1721 "affected" : [
4044 "type" : " WEB" ,
4145 "url" : " https://github.com/openclaw/openclaw/security/advisories/GHSA-v6c6-vqqg-w888"
4246 },
47+ {
48+ "type" : " ADVISORY" ,
49+ "url" : " https://nvd.nist.gov/vuln/detail/CVE-2026-28456"
50+ },
4351 {
4452 "type" : " WEB" ,
4553 "url" : " https://github.com/openclaw/openclaw/commit/35c0e66ed057f1a9f7ad2515fdcef516bd6584ce"
5563 {
5664 "type" : " WEB" ,
5765 "url" : " https://github.com/openclaw/openclaw/releases/tag/v2026.2.14"
66+ },
67+ {
68+ "type" : " WEB" ,
69+ "url" : " https://www.vulncheck.com/advisories/openclaw-arbitrary-code-execution-via-unsafe-hook-module-path-handling"
5870 }
5971 ],
6072 "database_specific" : {
6173 "cwe_ids" : [
62- " CWE-22"
74+ " CWE-22" ,
75+ " CWE-427"
6376 ],
6477 "severity" : " HIGH" ,
6578 "github_reviewed" : true ,
6679 "github_reviewed_at" : " 2026-02-18T00:57:48Z" ,
67- "nvd_published_at" : null
80+ "nvd_published_at" : " 2026-03-05T22:16:18Z "
6881 }
6982}
Original file line number Diff line number Diff line change 11{
22 "schema_version" : " 1.4.0" ,
33 "id" : " GHSA-wfp2-v9c7-fh79" ,
4- "modified" : " 2026-03-05T21:49:36Z " ,
4+ "modified" : " 2026-03-06T01:01:05Z " ,
55 "published" : " 2026-02-17T21:30:48Z" ,
66 "aliases" : [
77 " CVE-2026-28467"
1212 {
1313 "type" : " CVSS_V3" ,
1414 "score" : " CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
15+ },
16+ {
17+ "type" : " CVSS_V4" ,
18+ "score" : " CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L"
1519 }
1620 ],
1721 "affected" : [
4044 "type" : " WEB" ,
4145 "url" : " https://github.com/openclaw/openclaw/security/advisories/GHSA-wfp2-v9c7-fh79"
4246 },
47+ {
48+ "type" : " ADVISORY" ,
49+ "url" : " https://nvd.nist.gov/vuln/detail/CVE-2026-28467"
50+ },
4351 {
4452 "type" : " WEB" ,
4553 "url" : " https://github.com/openclaw/openclaw/commit/81c68f582d4a9a20d9cca9f367d2da9edc5a65ae"
5563 {
5664 "type" : " WEB" ,
5765 "url" : " https://github.com/openclaw/openclaw/releases/tag/v2026.2.2"
66+ },
67+ {
68+ "type" : " WEB" ,
69+ "url" : " https://www.vulncheck.com/advisories/openclaw-ssrf-via-attachment-media-url-hydration"
5870 }
5971 ],
6072 "database_specific" : {
6476 "severity" : " MODERATE" ,
6577 "github_reviewed" : true ,
6678 "github_reviewed_at" : " 2026-02-17T21:30:48Z" ,
67- "nvd_published_at" : null
79+ "nvd_published_at" : " 2026-03-05T22:16:19Z "
6880 }
6981}
Original file line number Diff line number Diff line change 11{
22 "schema_version" : " 1.4.0" ,
33 "id" : " GHSA-xc7w-v5x6-cc87" ,
4- "modified" : " 2026-03-05T22:01:17Z " ,
4+ "modified" : " 2026-03-06T01:00:29Z " ,
55 "published" : " 2026-02-17T17:14:00Z" ,
66 "aliases" : [
77 " CVE-2026-29613"
1212 {
1313 "type" : " CVSS_V3" ,
1414 "score" : " CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
15+ },
16+ {
17+ "type" : " CVSS_V4" ,
18+ "score" : " CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"
1519 }
1620 ],
1721 "affected" : [
4044 "type" : " WEB" ,
4145 "url" : " https://github.com/openclaw/openclaw/security/advisories/GHSA-xc7w-v5x6-cc87"
4246 },
47+ {
48+ "type" : " ADVISORY" ,
49+ "url" : " https://nvd.nist.gov/vuln/detail/CVE-2026-29613"
50+ },
4351 {
4452 "type" : " WEB" ,
4553 "url" : " https://github.com/openclaw/openclaw/commit/743f4b28495cdeb0d5bf76f6ebf4af01f6a02e5a"
5563 {
5664 "type" : " WEB" ,
5765 "url" : " https://github.com/openclaw/openclaw/releases/tag/v2026.2.12"
66+ },
67+ {
68+ "type" : " WEB" ,
69+ "url" : " https://www.vulncheck.com/advisories/openclaw-webhook-authentication-bypass-via-loopback-remoteaddress-trust"
5870 }
5971 ],
6072 "database_specific" : {
6173 "cwe_ids" : [
6274 " CWE-306"
6375 ],
64- "severity" : " MODERATE " ,
76+ "severity" : " HIGH " ,
6577 "github_reviewed" : true ,
6678 "github_reviewed_at" : " 2026-02-17T17:14:00Z" ,
67- "nvd_published_at" : null
79+ "nvd_published_at" : " 2026-03-05T22:16:24Z "
6880 }
6981}
You can’t perform that action at this time.
0 commit comments