Skip to content

File tree

advisories/github-reviewed/2026/03/GHSA-2ww6-868g-2c56/GHSA-2ww6-868g-2c56.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2ww6-868g-2c56",
4-
"modified": "2026-03-19T22:30:09Z",
4+
"modified": "2026-03-20T21:14:26Z",
55
"published": "2026-03-03T18:30:39Z",
66
"aliases": [
77
"CVE-2026-32040"
88
],
99
"summary": "OpenClaw Vulnerable to HTML injection via unvalidated image MIME type in data-URL interpolation",
1010
"details": "## Summary\n\nThe HTML session exporter (`src/auto-reply/reply/export-html/template.js`) interpolates `img.mimeType` directly into `<img src=\"data:...\">` attributes without validation or escaping. A crafted `mimeType` value (e.g., `x\" onerror=\"alert(1)`) can break out of the attribute context and execute arbitrary JavaScript.\n\n## Impact\n\nAn attacker who can control image entries in session data (via crafted tool results or session manipulation) can achieve XSS when the exported HTML is opened. The precondition is tighter than the main XSS finding (requires image content blocks with a malicious mimeType), but exploitation is straightforward.\n\n## Affected components\n\n- `src/auto-reply/reply/export-html/template.js` — line 1032 (tool result images), line 1306 (user message images)\n\n## Reproduction\n\n1. Craft a session entry with an image content block where `mimeType` is set to `image/png\" onerror=\"alert(document.domain)`\n2. Export the session to HTML\n3. Open the exported HTML — the injected `onerror` fires\n\n## Remediation\n\n- Added `sanitizeImageMimeType()` helper that validates mimeType against a whitelist of known image MIME types\n- Falls back to `application/octet-stream` for unrecognized values, preventing attribute breakout\n\n## Fix\n\nhttps://github.com/openclaw/openclaw/pull/24140",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
15+
},
1216
{
1317
"type": "CVSS_V4",
1418
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"
@@ -40,6 +44,10 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-2ww6-868g-2c56"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32040"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/pull/24140"
@@ -51,6 +59,10 @@
5159
{
5260
"type": "PACKAGE",
5361
"url": "https://github.com/openclaw/openclaw"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://www.vulncheck.com/advisories/openclaw-html-injection-via-unvalidated-image-mime-type-in-data-url-interpolation"
5466
}
5567
],
5668
"database_specific": {
@@ -60,6 +72,6 @@
6072
"severity": "MODERATE",
6173
"github_reviewed": true,
6274
"github_reviewed_at": "2026-03-03T18:30:39Z",
63-
"nvd_published_at": null
75+
"nvd_published_at": "2026-03-19T22:16:40Z"
6476
}
6577
}

advisories/github-reviewed/2026/03/GHSA-4wr4-f2qf-x5wj/GHSA-4wr4-f2qf-x5wj.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4wr4-f2qf-x5wj",
4-
"modified": "2026-03-16T21:18:39Z",
4+
"modified": "2026-03-20T21:15:47Z",
55
"published": "2026-03-16T21:18:39Z",
66
"aliases": [
77
"CVE-2026-32757"
@@ -43,9 +43,17 @@
4343
"type": "WEB",
4444
"url": "https://github.com/Admidio/admidio/security/advisories/GHSA-4wr4-f2qf-x5wj"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32757"
49+
},
4650
{
4751
"type": "PACKAGE",
4852
"url": "https://github.com/Admidio/admidio"
53+
},
54+
{
55+
"type": "WEB",
56+
"url": "https://github.com/Admidio/admidio/releases/tag/v5.0.7"
4957
}
5058
],
5159
"database_specific": {
@@ -55,6 +63,6 @@
5563
"severity": "MODERATE",
5664
"github_reviewed": true,
5765
"github_reviewed_at": "2026-03-16T21:18:39Z",
58-
"nvd_published_at": null
66+
"nvd_published_at": "2026-03-20T00:16:16Z"
5967
}
6068
}

advisories/github-reviewed/2026/03/GHSA-5gg9-5g7w-hm73/GHSA-5gg9-5g7w-hm73.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5gg9-5g7w-hm73",
4-
"modified": "2026-03-18T21:42:55Z",
4+
"modified": "2026-03-20T21:15:12Z",
55
"published": "2026-03-16T20:44:20Z",
66
"aliases": [
77
"CVE-2026-32760"
@@ -43,9 +43,21 @@
4343
"type": "WEB",
4444
"url": "https://github.com/filebrowser/filebrowser/security/advisories/GHSA-5gg9-5g7w-hm73"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32760"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://github.com/filebrowser/filebrowser/commit/a63573b67eb302167b4c4f218361a2d0c138deab"
53+
},
4654
{
4755
"type": "PACKAGE",
4856
"url": "https://github.com/filebrowser/filebrowser"
57+
},
58+
{
59+
"type": "WEB",
60+
"url": "https://github.com/filebrowser/filebrowser/releases/tag/v2.62.0"
4961
}
5062
],
5163
"database_specific": {
@@ -56,6 +68,6 @@
5668
"severity": "CRITICAL",
5769
"github_reviewed": true,
5870
"github_reviewed_at": "2026-03-16T20:44:20Z",
59-
"nvd_published_at": null
71+
"nvd_published_at": "2026-03-20T00:16:17Z"
6072
}
6173
}

advisories/github-reviewed/2026/03/GHSA-6gx3-4362-rf54/GHSA-6gx3-4362-rf54.json

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,19 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6gx3-4362-rf54",
4-
"modified": "2026-03-17T19:49:35Z",
4+
"modified": "2026-03-20T21:16:03Z",
55
"published": "2026-03-17T19:49:35Z",
66
"aliases": [
77
"CVE-2026-32766"
88
],
99
"summary": "astral-tokio-tar insufficiently validates PAX extensions during extraction",
1010
"details": "## Impact\n\nIn versions 0.5.6 and earlier of astral-tokio-tar, malformed PAX extensions were silently skipped when parsing tar archives. This silent skipping (rather than rejection) of invalid PAX extensions could be used as a building block for a parser differential, for example by having astral-tokio-tar silently skip a malformed GNU “long link” extension so that a subsequent parser would misinterpret the extension.\n\nIn practice, exploiting this behavior in astral-tokio-tar requires a secondary misbehaving tar parser, i.e. one that insufficiently validates malformed PAX extensions and interprets them rather than skipping or erroring on them. Consequently this advisory is considered low-severity within astral-tokio-tar itself, as it requires a separate vulnerability against any unrelated tar parser.\n\n## Patches\n\nVersions 0.6.0 and newer of astral-tokio-tar reject invalid PAX extensions, rather than silently skipping them. \n\n## Workarounds\n\nUsers are advised to upgrade to version 0.6.0 or newer to address this advisory.\n\nMost users should experience no breaking changes as a result of the patch above. Some users who attempt to extract poorly constructed tar files may experience errors; users should re-construct their tar files with a conforming tar parser.\n\n## Attribution\n\n- Sergei Zimmerman (@xokdvium)",
11-
"severity": [],
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
15+
}
16+
],
1217
"affected": [
1318
{
1419
"package": {
@@ -38,6 +43,10 @@
3843
"type": "WEB",
3944
"url": "https://github.com/astral-sh/tokio-tar/security/advisories/GHSA-6gx3-4362-rf54"
4045
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32766"
49+
},
4150
{
4251
"type": "WEB",
4352
"url": "https://github.com/astral-sh/tokio-tar/commit/e5e0139cae4577eeedf5fc16b65e690bf988ce52"
@@ -54,6 +63,6 @@
5463
"severity": "LOW",
5564
"github_reviewed": true,
5665
"github_reviewed_at": "2026-03-17T19:49:35Z",
57-
"nvd_published_at": null
66+
"nvd_published_at": "2026-03-20T00:16:18Z"
5867
}
5968
}

advisories/github-reviewed/2026/03/GHSA-95cq-p4w2-32w5/GHSA-95cq-p4w2-32w5.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-95cq-p4w2-32w5",
4-
"modified": "2026-03-16T21:16:50Z",
4+
"modified": "2026-03-20T21:15:25Z",
55
"published": "2026-03-16T21:16:50Z",
66
"aliases": [
77
"CVE-2026-32756"
@@ -43,9 +43,17 @@
4343
"type": "WEB",
4444
"url": "https://github.com/Admidio/admidio/security/advisories/GHSA-95cq-p4w2-32w5"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32756"
49+
},
4650
{
4751
"type": "PACKAGE",
4852
"url": "https://github.com/Admidio/admidio"
53+
},
54+
{
55+
"type": "WEB",
56+
"url": "https://github.com/Admidio/admidio/releases/tag/v5.0.7"
4957
}
5058
],
5159
"database_specific": {
@@ -55,6 +63,6 @@
5563
"severity": "HIGH",
5664
"github_reviewed": true,
5765
"github_reviewed_at": "2026-03-16T21:16:50Z",
58-
"nvd_published_at": null
66+
"nvd_published_at": "2026-03-20T00:16:16Z"
5967
}
6068
}

advisories/github-reviewed/2026/03/GHSA-9f3r-2vgw-m8xp/GHSA-9f3r-2vgw-m8xp.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9f3r-2vgw-m8xp",
4-
"modified": "2026-03-16T20:45:12Z",
4+
"modified": "2026-03-20T21:15:19Z",
55
"published": "2026-03-16T20:45:12Z",
66
"aliases": [
77
"CVE-2026-32758"
@@ -43,9 +43,21 @@
4343
"type": "WEB",
4444
"url": "https://github.com/filebrowser/filebrowser/security/advisories/GHSA-9f3r-2vgw-m8xp"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32758"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://github.com/filebrowser/filebrowser/commit/4bd7d69c82163b201a987e99c0c50d7ecc6ee5f1"
53+
},
4654
{
4755
"type": "PACKAGE",
4856
"url": "https://github.com/filebrowser/filebrowser"
57+
},
58+
{
59+
"type": "WEB",
60+
"url": "https://github.com/filebrowser/filebrowser/releases/tag/v2.62.0"
4961
}
5062
],
5163
"database_specific": {
@@ -56,6 +68,6 @@
5668
"severity": "MODERATE",
5769
"github_reviewed": true,
5870
"github_reviewed_at": "2026-03-16T20:45:12Z",
59-
"nvd_published_at": null
71+
"nvd_published_at": "2026-03-20T00:16:17Z"
6072
}
6173
}

advisories/github-reviewed/2026/03/GHSA-ffx7-75gc-jg7c/GHSA-ffx7-75gc-jg7c.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-ffx7-75gc-jg7c",
4-
"modified": "2026-03-16T20:43:29Z",
4+
"modified": "2026-03-20T21:15:05Z",
55
"published": "2026-03-16T20:43:29Z",
66
"aliases": [
77
"CVE-2026-32759"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/filebrowser/filebrowser/security/advisories/GHSA-ffx7-75gc-jg7c"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32759"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/filebrowser/filebrowser/issues/5199"
@@ -56,6 +60,6 @@
5660
"severity": "MODERATE",
5761
"github_reviewed": true,
5862
"github_reviewed_at": "2026-03-16T20:43:29Z",
59-
"nvd_published_at": null
63+
"nvd_published_at": "2026-03-20T00:16:17Z"
6064
}
6165
}

advisories/github-reviewed/2026/03/GHSA-g375-5wmp-xr78/GHSA-g375-5wmp-xr78.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g375-5wmp-xr78",
4-
"modified": "2026-03-18T21:41:54Z",
4+
"modified": "2026-03-20T21:15:55Z",
55
"published": "2026-03-16T21:18:53Z",
66
"aliases": [
77
"CVE-2026-32818"
@@ -43,9 +43,17 @@
4343
"type": "WEB",
4444
"url": "https://github.com/Admidio/admidio/security/advisories/GHSA-g375-5wmp-xr78"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32818"
49+
},
4650
{
4751
"type": "PACKAGE",
4852
"url": "https://github.com/Admidio/admidio"
53+
},
54+
{
55+
"type": "WEB",
56+
"url": "https://github.com/Admidio/admidio/releases/tag/v5.0.7"
4957
}
5058
],
5159
"database_specific": {
@@ -55,6 +63,6 @@
5563
"severity": "MODERATE",
5664
"github_reviewed": true,
5765
"github_reviewed_at": "2026-03-16T21:18:53Z",
58-
"nvd_published_at": null
66+
"nvd_published_at": "2026-03-19T23:16:44Z"
5967
}
6068
}

advisories/github-reviewed/2026/03/GHSA-h8gr-qwr6-m9gx/GHSA-h8gr-qwr6-m9gx.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-h8gr-qwr6-m9gx",
4-
"modified": "2026-03-16T21:17:35Z",
4+
"modified": "2026-03-20T21:15:40Z",
55
"published": "2026-03-16T21:17:34Z",
66
"aliases": [
77
"CVE-2026-32755"
@@ -43,9 +43,17 @@
4343
"type": "WEB",
4444
"url": "https://github.com/Admidio/admidio/security/advisories/GHSA-h8gr-qwr6-m9gx"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32755"
49+
},
4650
{
4751
"type": "PACKAGE",
4852
"url": "https://github.com/Admidio/admidio"
53+
},
54+
{
55+
"type": "WEB",
56+
"url": "https://github.com/Admidio/admidio/releases/tag/v5.0.7"
4957
}
5058
],
5159
"database_specific": {
@@ -55,6 +63,6 @@
5563
"severity": "MODERATE",
5664
"github_reviewed": true,
5765
"github_reviewed_at": "2026-03-16T21:17:34Z",
58-
"nvd_published_at": null
66+
"nvd_published_at": "2026-03-19T23:16:44Z"
5967
}
6068
}

advisories/github-reviewed/2026/03/GHSA-q6qf-4p5j-r25g/GHSA-q6qf-4p5j-r25g.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-q6qf-4p5j-r25g",
4-
"modified": "2026-03-19T22:16:55Z",
4+
"modified": "2026-03-20T21:14:03Z",
55
"published": "2026-03-04T19:13:48Z",
66
"aliases": [
77
"CVE-2026-32002"
@@ -12,6 +12,10 @@
1212
{
1313
"type": "CVSS_V3",
1414
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
1519
}
1620
],
1721
"affected": [
@@ -40,13 +44,21 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-q6qf-4p5j-r25g"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32002"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/commit/dd9d9c1c609dcb4579f9e57bd7b5c879d0146b53"
4654
},
4755
{
4856
"type": "PACKAGE",
4957
"url": "https://github.com/openclaw/openclaw"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://www.vulncheck.com/advisories/openclaw-sandbox-boundary-bypass-via-image-tool-workspaceonly-bypass"
5062
}
5163
],
5264
"database_specific": {
@@ -57,6 +69,6 @@
5769
"severity": "MODERATE",
5870
"github_reviewed": true,
5971
"github_reviewed_at": "2026-03-04T19:13:48Z",
60-
"nvd_published_at": null
72+
"nvd_published_at": "2026-03-19T22:16:32Z"
6173
}
6274
}

0 commit comments

Comments
 (0)