Skip to content

Commit 1b8497a

Browse files
1 parent fed76c1 commit 1b8497a

8 files changed

Lines changed: 88 additions & 19 deletions

File tree

advisories/github-reviewed/2026/03/GHSA-cxmw-p77q-wchg/GHSA-cxmw-p77q-wchg.json

Lines changed: 19 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,21 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-cxmw-p77q-wchg",
4-
"modified": "2026-04-10T17:21:07Z",
4+
"modified": "2026-04-10T19:38:04Z",
55
"published": "2026-03-26T19:30:52Z",
66
"aliases": [
77
"CVE-2026-35643"
88
],
99
"summary": "OpenClaw: Arbitrary code execution via unvalidated WebView JavascriptInterface",
1010
"details": "## Summary\nAndroid Canvas WebView pages from untrusted origins could invoke the JavascriptInterface bridge and inject instructions into the app.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Affected: < 2026.3.22\n- Fixed: >= 2026.3.22\n- Latest released tag checked: `v2026.3.23-2` (`630f1479c44f78484dfa21bb407cbe6f171dac87`)\n- Latest published npm version checked: `2026.3.23-2`\n\n## Fix Commit(s)\n- `8b02ef133275be96d8aac2283100016c8a7f32e5`\n\n## Release Status\nThe fix shipped in `v2026.3.22` and remains present in `v2026.3.23` and `v2026.3.23-2`.\n\n## Code-Level Confirmation\n- apps/android/app/src/main/java/ai/openclaw/app/ui/CanvasScreen.kt now snapshots page origin and rejects untrusted bridge calls.\n- apps/android/app/src/main/java/ai/openclaw/app/node/CanvasActionTrust.kt centralizes trusted origin and path validation for the bridge.\n\nOpenClaw thanks @cyjhhh for reporting.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
15+
},
1216
{
1317
"type": "CVSS_V4",
14-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -40,13 +44,25 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-cxmw-p77q-wchg"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35643"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dac87"
4654
},
55+
{
56+
"type": "WEB",
57+
"url": "https://github.com/openclaw/openclaw/commit/8b02ef133275be96d8aac2283100016c8a7f32e5"
58+
},
4759
{
4860
"type": "PACKAGE",
4961
"url": "https://github.com/openclaw/openclaw"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://www.vulncheck.com/advisories/openclaw-arbitrary-code-execution-via-unvalidated-webview-javascriptinterface"
5066
}
5167
],
5268
"database_specific": {
@@ -57,6 +73,6 @@
5773
"severity": "HIGH",
5874
"github_reviewed": true,
5975
"github_reviewed_at": "2026-03-26T19:30:52Z",
60-
"nvd_published_at": null
76+
"nvd_published_at": "2026-04-10T17:17:04Z"
6177
}
6278
}

advisories/github-reviewed/2026/03/GHSA-qm9x-v7cx-7rq4/GHSA-qm9x-v7cx-7rq4.json

Lines changed: 20 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,21 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qm9x-v7cx-7rq4",
4-
"modified": "2026-04-10T17:29:00Z",
4+
"modified": "2026-04-10T19:37:43Z",
55
"published": "2026-03-26T19:08:45Z",
66
"aliases": [
77
"CVE-2026-35666"
88
],
99
"summary": "OpenClaw's system.run allowlist can be bypassed through an unregistered time dispatch wrapper",
1010
"details": "## Summary\nAllow-always exec approvals did not unwrap /usr/bin/time, so an unregistered time wrapper could bypass executable binding and reuse approval state for the inner command.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Affected: < 2026.3.22\n- Fixed: >= 2026.3.22\n- Latest released tag checked: `v2026.3.23-2` (`630f1479c44f78484dfa21bb407cbe6f171dac87`)\n- Latest published npm version checked: `2026.3.23-2`\n\n## Fix Commit(s)\n- `39409b6a6dd4239deea682e626bac9ba547bfb14`\n\n## Release Status\nThe fix shipped in `v2026.3.22` and remains present in `v2026.3.23` and `v2026.3.23-2`.\n\n## Code-Level Confirmation\n- src/infra/dispatch-wrapper-resolution.ts now unwraps /usr/bin/time and binds approvals to the real inner executable.\n- src/infra/exec-approvals-allow-always.test.ts ships regression coverage for time-wrapper allow-always approval bypasses.\n\nOpenClaw thanks @YLChen-007 for reporting.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
15+
},
1216
{
1317
"type": "CVSS_V4",
14-
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -40,22 +44,35 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-qm9x-v7cx-7rq4"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35666"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/commit/39409b6a6dd4239deea682e626bac9ba547bfb14"
4654
},
55+
{
56+
"type": "WEB",
57+
"url": "https://github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dac87"
58+
},
4759
{
4860
"type": "PACKAGE",
4961
"url": "https://github.com/openclaw/openclaw"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://www.vulncheck.com/advisories/openclaw-allowlist-bypass-via-unregistered-time-dispatch-wrapper"
5066
}
5167
],
5268
"database_specific": {
5369
"cwe_ids": [
70+
"CWE-706",
5471
"CWE-863"
5572
],
5673
"severity": "HIGH",
5774
"github_reviewed": true,
5875
"github_reviewed_at": "2026-03-26T19:08:45Z",
59-
"nvd_published_at": null
76+
"nvd_published_at": "2026-04-10T17:17:08Z"
6077
}
6178
}

advisories/github-reviewed/2026/03/GHSA-rvqr-hrcc-j9vv/GHSA-rvqr-hrcc-j9vv.json

Lines changed: 19 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,21 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rvqr-hrcc-j9vv",
4-
"modified": "2026-04-10T17:26:46Z",
4+
"modified": "2026-04-10T19:38:24Z",
55
"published": "2026-03-26T19:50:24Z",
66
"aliases": [
77
"CVE-2026-35659"
88
],
99
"summary": "OpenClaw: Bonjour/DNS-SD TXT metadata steers CLI routing after failed service resolution",
1010
"details": "## Summary\nBonjour and DNS-SD TXT metadata could still steer CLI routing even when actual service resolution failed, allowing unresolved hints to influence the chosen target.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Affected: < 2026.3.22\n- Fixed: >= 2026.3.22\n- Latest released tag checked: `v2026.3.23-2` (`630f1479c44f78484dfa21bb407cbe6f171dac87`)\n- Latest published npm version checked: `2026.3.23-2`\n\n## Fix Commit(s)\n- `deecf68b59a9b7eea978e40fd3c2fe543087b569`\n\n## Release Status\nThe fix shipped in `v2026.3.22` and remains present in `v2026.3.23` and `v2026.3.23-2`.\n\n## Code-Level Confirmation\n- src/infra/bonjour-discovery.ts now resolves and returns only concrete endpoints instead of falling back to unresolved TXT host and port hints.\n- src/cli/gateway-cli/discover.ts consumes only the fail-closed resolved endpoint path.\n\nOpenClaw thanks @nexrin for reporting.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
15+
},
1216
{
1317
"type": "CVSS_V4",
14-
"score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L"
18+
"score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -40,13 +44,25 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rvqr-hrcc-j9vv"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35659"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/openclaw/openclaw/commit/630f1479c44f78484dfa21bb407cbe6f171dac87"
54+
},
4355
{
4456
"type": "WEB",
4557
"url": "https://github.com/openclaw/openclaw/commit/deecf68b59a9b7eea978e40fd3c2fe543087b569"
4658
},
4759
{
4860
"type": "PACKAGE",
4961
"url": "https://github.com/openclaw/openclaw"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://www.vulncheck.com/advisories/openclaw-unresolved-service-metadata-routing-via-bonjour-and-dns-sd-discovery"
5066
}
5167
],
5268
"database_specific": {
@@ -57,6 +73,6 @@
5773
"severity": "MODERATE",
5874
"github_reviewed": true,
5975
"github_reviewed_at": "2026-03-26T19:50:24Z",
60-
"nvd_published_at": null
76+
"nvd_published_at": "2026-04-10T17:17:07Z"
6177
}
6278
}

advisories/github-reviewed/2026/04/GHSA-2vq4-854f-5c72/GHSA-2vq4-854f-5c72.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2vq4-854f-5c72",
4-
"modified": "2026-04-10T15:33:50Z",
4+
"modified": "2026-04-10T19:36:15Z",
55
"published": "2026-04-10T15:33:50Z",
66
"aliases": [
77
"CVE-2026-35595"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://github.com/go-vikunja/vikunja/security/advisories/GHSA-2vq4-854f-5c72"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35595"
49+
},
4650
{
4751
"type": "WEB",
4852
"url": "https://github.com/go-vikunja/vikunja/pull/2583"
@@ -67,6 +71,6 @@
6771
"severity": "HIGH",
6872
"github_reviewed": true,
6973
"github_reviewed_at": "2026-04-10T15:33:50Z",
70-
"nvd_published_at": null
74+
"nvd_published_at": "2026-04-10T17:17:02Z"
7175
}
7276
}

advisories/github-reviewed/2026/04/GHSA-48ch-p4gq-x46x/GHSA-48ch-p4gq-x46x.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-48ch-p4gq-x46x",
4-
"modified": "2026-04-10T15:34:23Z",
4+
"modified": "2026-04-10T19:36:26Z",
55
"published": "2026-04-10T15:34:23Z",
66
"aliases": [
77
"CVE-2026-35598"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://github.com/go-vikunja/vikunja/security/advisories/GHSA-48ch-p4gq-x46x"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35598"
49+
},
4650
{
4751
"type": "WEB",
4852
"url": "https://github.com/go-vikunja/vikunja/pull/2579"
@@ -67,6 +71,6 @@
6771
"severity": "MODERATE",
6872
"github_reviewed": true,
6973
"github_reviewed_at": "2026-04-10T15:34:23Z",
70-
"nvd_published_at": null
74+
"nvd_published_at": "2026-04-10T17:17:03Z"
7175
}
7276
}

advisories/github-reviewed/2026/04/GHSA-96q5-xm3p-7m84/GHSA-96q5-xm3p-7m84.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-96q5-xm3p-7m84",
4-
"modified": "2026-04-10T15:31:11Z",
4+
"modified": "2026-04-10T19:36:07Z",
55
"published": "2026-04-10T15:31:11Z",
66
"aliases": [
77
"CVE-2026-35594"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://github.com/go-vikunja/vikunja/security/advisories/GHSA-96q5-xm3p-7m84"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35594"
49+
},
4650
{
4751
"type": "WEB",
4852
"url": "https://github.com/go-vikunja/vikunja/pull/2581"
@@ -67,6 +71,6 @@
6771
"severity": "MODERATE",
6872
"github_reviewed": true,
6973
"github_reviewed_at": "2026-04-10T15:31:11Z",
70-
"nvd_published_at": null
74+
"nvd_published_at": "2026-04-10T16:16:32Z"
7175
}
7276
}

advisories/github-reviewed/2026/04/GHSA-fgfv-pv97-6cmj/GHSA-fgfv-pv97-6cmj.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fgfv-pv97-6cmj",
4-
"modified": "2026-04-10T15:34:14Z",
4+
"modified": "2026-04-10T19:36:20Z",
55
"published": "2026-04-10T15:34:14Z",
66
"aliases": [
77
"CVE-2026-35597"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://github.com/go-vikunja/vikunja/security/advisories/GHSA-fgfv-pv97-6cmj"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35597"
49+
},
4650
{
4751
"type": "WEB",
4852
"url": "https://github.com/go-vikunja/vikunja/pull/2576"
@@ -67,6 +71,6 @@
6771
"severity": "MODERATE",
6872
"github_reviewed": true,
6973
"github_reviewed_at": "2026-04-10T15:34:14Z",
70-
"nvd_published_at": null
74+
"nvd_published_at": "2026-04-10T17:17:03Z"
7175
}
7276
}

advisories/github-reviewed/2026/04/GHSA-r4fg-73rc-hhh7/GHSA-r4fg-73rc-hhh7.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-r4fg-73rc-hhh7",
4-
"modified": "2026-04-10T15:34:41Z",
4+
"modified": "2026-04-10T19:36:35Z",
55
"published": "2026-04-10T15:34:41Z",
66
"aliases": [
77
"CVE-2026-35599"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://github.com/go-vikunja/vikunja/security/advisories/GHSA-r4fg-73rc-hhh7"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35599"
49+
},
4650
{
4751
"type": "WEB",
4852
"url": "https://github.com/go-vikunja/vikunja/pull/2577"
@@ -67,6 +71,6 @@
6771
"severity": "MODERATE",
6872
"github_reviewed": true,
6973
"github_reviewed_at": "2026-04-10T15:34:41Z",
70-
"nvd_published_at": null
74+
"nvd_published_at": "2026-04-10T17:17:03Z"
7175
}
7276
}

0 commit comments

Comments
 (0)