Skip to content

Commit fb0452a

Browse files
1 parent 50f5a14 commit fb0452a

3 files changed

Lines changed: 22 additions & 6 deletions

File tree

advisories/github-reviewed/2026/02/GHSA-33rq-m5x2-fvgf/GHSA-33rq-m5x2-fvgf.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-33rq-m5x2-fvgf",
4-
"modified": "2026-03-05T21:43:49Z",
4+
"modified": "2026-03-11T20:41:24Z",
55
"published": "2026-02-17T21:37:55Z",
66
"aliases": [
77
"CVE-2026-28448"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-33rq-m5x2-fvgf"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28448"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/openclaw/openclaw/commit/8c7901c984866a776eb59662dc9d8b028de4f0d0"
@@ -51,6 +55,10 @@
5155
{
5256
"type": "WEB",
5357
"url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.1"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://www.vulncheck.com/advisories/openclaw-authorization-bypass-in-twitch-plugin-allowfrom-access-control"
5462
}
5563
],
5664
"database_specific": {
@@ -60,6 +68,6 @@
6068
"severity": "HIGH",
6169
"github_reviewed": true,
6270
"github_reviewed_at": "2026-02-17T21:37:55Z",
63-
"nvd_published_at": null
71+
"nvd_published_at": "2026-03-05T22:16:16Z"
6472
}
6573
}

advisories/github-reviewed/2026/02/GHSA-x22m-j5qq-j49m/GHSA-x22m-j5qq-j49m.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-x22m-j5qq-j49m",
4-
"modified": "2026-03-05T21:44:46Z",
4+
"modified": "2026-03-11T20:41:53Z",
55
"published": "2026-02-18T17:45:12Z",
66
"aliases": [
77
"CVE-2026-28451"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-x22m-j5qq-j49m"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-28451"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/openclaw/openclaw/pull/16285"
@@ -55,6 +59,10 @@
5559
{
5660
"type": "WEB",
5761
"url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://www.vulncheck.com/advisories/openclaw-ssrf-via-feishu-extension-media-fetching"
5866
}
5967
],
6068
"database_specific": {
@@ -64,6 +72,6 @@
6472
"severity": "HIGH",
6573
"github_reviewed": true,
6674
"github_reviewed_at": "2026-02-18T17:45:12Z",
67-
"nvd_published_at": null
75+
"nvd_published_at": "2026-03-05T22:16:17Z"
6876
}
6977
}

advisories/github-reviewed/2026/03/GHSA-3cw6-2j68-868p/GHSA-3cw6-2j68-868p.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3cw6-2j68-868p",
4-
"modified": "2026-03-10T22:54:41Z",
4+
"modified": "2026-03-11T20:42:23Z",
55
"published": "2026-03-10T18:16:26Z",
66
"aliases": [
77
"CVE-2026-26310"
88
],
9-
"summary": "Envoy vulenrable to crash for scoped ip address during DNS",
9+
"summary": "Envoy vulnerable to crash for scoped ip address during DNS",
1010
"details": "### Summary\n\nCalling `Utility::getAddressWithPort` with a scoped IPv6 addresses causes a crash. This utility is called in the data plane from the original_src filter and the dns filter.\n\n### Details\n\nThe crashing function is `Utility::getAddressWithPort`. The crash occurs if a string containing a scoped IPv6 address is passed to this function.\n\nThis vulnerability affects:\n\n1. The **original src filter**: If the filter is configured and the original source is a scoped IPv6 address, it will cause a crash.\n2. **DNS response address resolution**: If a DNS response contains a scoped IPv6 address, this will also trigger the crash.\n\n### PoC\n\nTo reproduce the vulnerability:\n\n1. **Method A (Original Src Filter):** Configure the `original src` filter in Envoy and provide a scoped IPv6 address as the original source.\n2. **Method B (DNS Resolution):** Trigger a DNS resolution process within Envoy where the DNS response contains a scoped IPv6 address.\n\n### Impact\n\nThis is a Denial of Service (DoS) vulnerability. It impacts users who have the `original src` filter configured or whose Envoy instances resolve addresses from DNS responses that may contain scoped IPv6 addresses.",
1111
"severity": [
1212
{

0 commit comments

Comments
 (0)