Skip to content

File tree

9 files changed

+137
-25
lines changed

9 files changed

+137
-25
lines changed

advisories/github-reviewed/2026/02/GHSA-3m3q-x3gj-f79x/GHSA-3m3q-x3gj-f79x.json

Lines changed: 17 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3m3q-x3gj-f79x",
4-
"modified": "2026-03-05T21:48:53Z",
4+
"modified": "2026-03-06T01:01:21Z",
55
"published": "2026-02-17T21:31:58Z",
66
"aliases": [
77
"CVE-2026-28465"
@@ -12,6 +12,10 @@
1212
{
1313
"type": "CVSS_V3",
1414
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -59,6 +63,10 @@
5963
"type": "WEB",
6064
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3m3q-x3gj-f79x"
6165
},
66+
{
67+
"type": "ADVISORY",
68+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28465"
69+
},
6270
{
6371
"type": "WEB",
6472
"url": "https://github.com/openclaw/openclaw/commit/a749db9820eb6d6224032a5a34223d286d2dcc2f"
@@ -70,15 +78,20 @@
7078
{
7179
"type": "WEB",
7280
"url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.3"
81+
},
82+
{
83+
"type": "WEB",
84+
"url": "https://www.vulncheck.com/advisories/openclaw-voice-call-webhook-verification-bypass-via-forwarded-headers"
7385
}
7486
],
7587
"database_specific": {
7688
"cwe_ids": [
77-
"CWE-287"
89+
"CWE-287",
90+
"CWE-345"
7891
],
79-
"severity": "MODERATE",
92+
"severity": "HIGH",
8093
"github_reviewed": true,
8194
"github_reviewed_at": "2026-02-17T21:31:58Z",
82-
"nvd_published_at": null
95+
"nvd_published_at": "2026-03-05T22:16:19Z"
8396
}
8497
}

advisories/github-reviewed/2026/02/GHSA-64qx-vpxx-mvqf/GHSA-64qx-vpxx-mvqf.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-64qx-vpxx-mvqf",
4-
"modified": "2026-03-05T21:47:27Z",
4+
"modified": "2026-03-06T01:00:19Z",
55
"published": "2026-02-17T16:43:51Z",
66
"aliases": [
77
"CVE-2026-28459"
@@ -12,6 +12,10 @@
1212
{
1313
"type": "CVSS_V3",
1414
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -40,6 +44,10 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-64qx-vpxx-mvqf"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28459"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/commit/25950bcbb8ba4d8cde002557f6e27c219ae4deda"
@@ -55,6 +63,10 @@
5563
{
5664
"type": "WEB",
5765
"url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.12"
66+
},
67+
{
68+
"type": "WEB",
69+
"url": "https://www.vulncheck.com/advisories/openclaw-arbitrary-file-write-via-untrusted-sessionfile-path"
5870
}
5971
],
6072
"database_specific": {
@@ -67,6 +79,6 @@
6779
"severity": "HIGH",
6880
"github_reviewed": true,
6981
"github_reviewed_at": "2026-02-17T16:43:51Z",
70-
"nvd_published_at": null
82+
"nvd_published_at": "2026-03-05T22:16:18Z"
7183
}
7284
}

advisories/github-reviewed/2026/02/GHSA-7vwx-582j-j332/GHSA-7vwx-582j-j332.json

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7vwx-582j-j332",
4-
"modified": "2026-03-05T21:54:43Z",
4+
"modified": "2026-03-06T01:02:00Z",
55
"published": "2026-02-17T21:38:14Z",
66
"aliases": [
77
"CVE-2026-28481"
@@ -12,6 +12,10 @@
1212
{
1313
"type": "CVSS_V3",
1414
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -40,6 +44,10 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-7vwx-582j-j332"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28481"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/commit/41cc5bcd4f1d434ad1bbdfa55b56f25025ecbf6b"
@@ -51,15 +59,19 @@
5159
{
5260
"type": "WEB",
5361
"url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.1"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://www.vulncheck.com/advisories/openclaw-bearer-token-leakage-via-ms-teams-attachment-downloader-suffix-matching"
5466
}
5567
],
5668
"database_specific": {
5769
"cwe_ids": [
5870
"CWE-201"
5971
],
60-
"severity": "HIGH",
72+
"severity": "MODERATE",
6173
"github_reviewed": true,
6274
"github_reviewed_at": "2026-02-17T21:38:14Z",
63-
"nvd_published_at": null
75+
"nvd_published_at": "2026-03-05T22:16:22Z"
6476
}
6577
}

advisories/github-reviewed/2026/02/GHSA-rmxw-jxxx-4cpc/GHSA-rmxw-jxxx-4cpc.json

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rmxw-jxxx-4cpc",
4-
"modified": "2026-03-05T21:51:00Z",
4+
"modified": "2026-03-06T01:01:45Z",
55
"published": "2026-02-17T21:34:17Z",
66
"aliases": [
77
"CVE-2026-28471"
@@ -12,6 +12,10 @@
1212
{
1313
"type": "CVSS_V3",
1414
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -40,6 +44,10 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rmxw-jxxx-4cpc"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28471"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/commit/8f3bfbd1c4fb967a2ddb5b4b9a05784920814bcf"
@@ -51,15 +59,20 @@
5159
{
5260
"type": "WEB",
5361
"url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.2"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://www.vulncheck.com/advisories/openclaw-allowlist-bypass-via-displayname-and-cross-homeserver-localpart-matching-in-matrix"
5466
}
5567
],
5668
"database_specific": {
5769
"cwe_ids": [
70+
"CWE-287",
5871
"CWE-290"
5972
],
6073
"severity": "MODERATE",
6174
"github_reviewed": true,
6275
"github_reviewed_at": "2026-02-17T21:34:17Z",
63-
"nvd_published_at": null
76+
"nvd_published_at": "2026-03-05T22:16:20Z"
6477
}
6578
}

advisories/github-reviewed/2026/02/GHSA-v6c6-vqqg-w888/GHSA-v6c6-vqqg-w888.json

Lines changed: 16 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-v6c6-vqqg-w888",
4-
"modified": "2026-03-05T21:46:11Z",
4+
"modified": "2026-03-06T00:59:44Z",
55
"published": "2026-02-18T00:57:48Z",
66
"aliases": [
77
"CVE-2026-28456"
@@ -12,6 +12,10 @@
1212
{
1313
"type": "CVSS_V3",
1414
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -40,6 +44,10 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v6c6-vqqg-w888"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28456"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/commit/35c0e66ed057f1a9f7ad2515fdcef516bd6584ce"
@@ -55,15 +63,20 @@
5563
{
5664
"type": "WEB",
5765
"url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14"
66+
},
67+
{
68+
"type": "WEB",
69+
"url": "https://www.vulncheck.com/advisories/openclaw-arbitrary-code-execution-via-unsafe-hook-module-path-handling"
5870
}
5971
],
6072
"database_specific": {
6173
"cwe_ids": [
62-
"CWE-22"
74+
"CWE-22",
75+
"CWE-427"
6376
],
6477
"severity": "HIGH",
6578
"github_reviewed": true,
6679
"github_reviewed_at": "2026-02-18T00:57:48Z",
67-
"nvd_published_at": null
80+
"nvd_published_at": "2026-03-05T22:16:18Z"
6881
}
6982
}

advisories/github-reviewed/2026/02/GHSA-wfp2-v9c7-fh79/GHSA-wfp2-v9c7-fh79.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-wfp2-v9c7-fh79",
4-
"modified": "2026-03-05T21:49:36Z",
4+
"modified": "2026-03-06T01:01:05Z",
55
"published": "2026-02-17T21:30:48Z",
66
"aliases": [
77
"CVE-2026-28467"
@@ -12,6 +12,10 @@
1212
{
1313
"type": "CVSS_V3",
1414
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L"
1519
}
1620
],
1721
"affected": [
@@ -40,6 +44,10 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-wfp2-v9c7-fh79"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28467"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/commit/81c68f582d4a9a20d9cca9f367d2da9edc5a65ae"
@@ -55,6 +63,10 @@
5563
{
5664
"type": "WEB",
5765
"url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.2"
66+
},
67+
{
68+
"type": "WEB",
69+
"url": "https://www.vulncheck.com/advisories/openclaw-ssrf-via-attachment-media-url-hydration"
5870
}
5971
],
6072
"database_specific": {
@@ -64,6 +76,6 @@
6476
"severity": "MODERATE",
6577
"github_reviewed": true,
6678
"github_reviewed_at": "2026-02-17T21:30:48Z",
67-
"nvd_published_at": null
79+
"nvd_published_at": "2026-03-05T22:16:19Z"
6880
}
6981
}

advisories/github-reviewed/2026/02/GHSA-xc7w-v5x6-cc87/GHSA-xc7w-v5x6-cc87.json

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xc7w-v5x6-cc87",
4-
"modified": "2026-03-05T22:01:17Z",
4+
"modified": "2026-03-06T01:00:29Z",
55
"published": "2026-02-17T17:14:00Z",
66
"aliases": [
77
"CVE-2026-29613"
@@ -12,6 +12,10 @@
1212
{
1313
"type": "CVSS_V3",
1414
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -40,6 +44,10 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-xc7w-v5x6-cc87"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-29613"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/commit/743f4b28495cdeb0d5bf76f6ebf4af01f6a02e5a"
@@ -55,15 +63,19 @@
5563
{
5664
"type": "WEB",
5765
"url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.12"
66+
},
67+
{
68+
"type": "WEB",
69+
"url": "https://www.vulncheck.com/advisories/openclaw-webhook-authentication-bypass-via-loopback-remoteaddress-trust"
5870
}
5971
],
6072
"database_specific": {
6173
"cwe_ids": [
6274
"CWE-306"
6375
],
64-
"severity": "MODERATE",
76+
"severity": "HIGH",
6577
"github_reviewed": true,
6678
"github_reviewed_at": "2026-02-17T17:14:00Z",
67-
"nvd_published_at": null
79+
"nvd_published_at": "2026-03-05T22:16:24Z"
6880
}
6981
}

0 commit comments

Comments
 (0)