Skip to content

File tree

9 files changed

+65
-23
lines changed

9 files changed

+65
-23
lines changed

advisories/github-reviewed/2026/03/GHSA-hc5h-pmr3-3497/GHSA-hc5h-pmr3-3497.json

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,17 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hc5h-pmr3-3497",
4-
"modified": "2026-03-31T23:50:22Z",
4+
"modified": "2026-04-06T23:39:43Z",
55
"published": "2026-03-31T23:50:22Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2026-33579"
8+
],
79
"summary": "OpenClaw: /pair approve command path omitted caller scope subsetting and reopened device pairing escalation",
8-
"details": "## Summary\n\nThe `/pair approve` command path called device approval without forwarding caller scopes into the core approval check.\n\n## Impact\n\nA caller that held pairing privileges but not admin privileges could approve a pending device request asking for broader scopes, including admin access.\n\n## Affected Component\n\n`extensions/device-pair/index.ts, src/infra/device-pairing.ts`\n\n## Fixed Versions\n\n- Affected: `<= 2026.3.24`\n- Patched: `>= 2026.3.28`\n- Latest stable `2026.3.28` contains the fix.\n\n## Fix\n\nFixed by commit `4ee4960de2` (`Pairing: forward caller scopes during approval`).",
10+
"details": "## Summary\n\nThe `/pair approve` command path called device approval without forwarding caller scopes into the core approval check.\n\n## Impact\n\nA caller that held pairing privileges but not admin privileges could approve a pending device request asking for broader scopes, including admin access.\n\n## Affected Component\n\n`extensions/device-pair/index.ts, src/infra/device-pairing.ts`\n\n## Fixed Versions\n\n- Affected: `<= 2026.3.24`\n- Patched: `>= 2026.3.28`\n- Latest stable `2026.3.28` contains the fix.\n\n## Fix\n\nFixed by commit `4ee4960de2` (`Pairing: forward caller scopes during approval`).\n\nOpenClaw thanks @AntAISecurityLab for reporting.",
911
"severity": [
1012
{
1113
"type": "CVSS_V4",
12-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"
1315
}
1416
],
1517
"affected": [
@@ -41,20 +43,28 @@
4143
"type": "WEB",
4244
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-hc5h-pmr3-3497"
4345
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33579"
49+
},
4450
{
4551
"type": "WEB",
4652
"url": "https://github.com/openclaw/openclaw/commit/4ee4960de2330b5322127f925f3687dc6f105be1"
4753
},
4854
{
4955
"type": "PACKAGE",
5056
"url": "https://github.com/openclaw/openclaw"
57+
},
58+
{
59+
"type": "WEB",
60+
"url": "https://www.vulncheck.com/advisories/openclaw-privilege-escalation-via-missing-caller-scope-validation-in-device-pair-approval"
5161
}
5262
],
5363
"database_specific": {
5464
"cwe_ids": [
5565
"CWE-863"
5666
],
57-
"severity": "HIGH",
67+
"severity": "CRITICAL",
5868
"github_reviewed": true,
5969
"github_reviewed_at": "2026-03-31T23:50:22Z",
6070
"nvd_published_at": null

advisories/github-reviewed/2026/04/GHSA-3mwp-wvh9-7528/GHSA-3mwp-wvh9-7528.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3mwp-wvh9-7528",
4-
"modified": "2026-04-03T15:35:48Z",
4+
"modified": "2026-04-06T23:40:16Z",
55
"published": "2026-04-03T15:35:48Z",
66
"aliases": [
77
"CVE-2026-34756"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/vllm-project/vllm/security/advisories/GHSA-3mwp-wvh9-7528"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34756"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/vllm-project/vllm/pull/37952"
@@ -60,6 +64,6 @@
6064
"severity": "MODERATE",
6165
"github_reviewed": true,
6266
"github_reviewed_at": "2026-04-03T15:35:48Z",
63-
"nvd_published_at": null
67+
"nvd_published_at": "2026-04-06T16:16:36Z"
6468
}
6569
}

advisories/github-reviewed/2026/04/GHSA-53mr-6c8q-9789/GHSA-53mr-6c8q-9789.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-53mr-6c8q-9789",
4-
"modified": "2026-04-03T21:59:31Z",
4+
"modified": "2026-04-06T23:40:36Z",
55
"published": "2026-04-03T21:59:31Z",
66
"aliases": [
77
"CVE-2026-35029"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/BerriAI/litellm/security/advisories/GHSA-53mr-6c8q-9789"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35029"
46+
},
4347
{
4448
"type": "PACKAGE",
4549
"url": "https://github.com/BerriAI/litellm"
@@ -52,6 +56,6 @@
5256
"severity": "HIGH",
5357
"github_reviewed": true,
5458
"github_reviewed_at": "2026-04-03T21:59:31Z",
55-
"nvd_published_at": null
59+
"nvd_published_at": "2026-04-06T17:17:12Z"
5660
}
5761
}

advisories/github-reviewed/2026/04/GHSA-658g-p7jg-wx5g/GHSA-658g-p7jg-wx5g.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-658g-p7jg-wx5g",
4-
"modified": "2026-04-02T18:34:04Z",
4+
"modified": "2026-04-06T23:41:01Z",
55
"published": "2026-04-02T18:34:04Z",
66
"aliases": [
77
"CVE-2026-34841"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://github.com/usebruno/bruno/security/advisories/GHSA-658g-p7jg-wx5g"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34841"
49+
},
4650
{
4751
"type": "WEB",
4852
"url": "https://github.com/axios/axios/issues/10604"
@@ -73,6 +77,6 @@
7377
"severity": "CRITICAL",
7478
"github_reviewed": true,
7579
"github_reviewed_at": "2026-04-02T18:34:04Z",
76-
"nvd_published_at": null
80+
"nvd_published_at": "2026-04-06T17:17:10Z"
7781
}
7882
}

advisories/github-reviewed/2026/04/GHSA-8x5q-pvf5-64mp/GHSA-8x5q-pvf5-64mp.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8x5q-pvf5-64mp",
4-
"modified": "2026-04-03T21:52:33Z",
4+
"modified": "2026-04-06T23:40:20Z",
55
"published": "2026-04-03T21:52:33Z",
66
"aliases": [
77
"CVE-2026-34764"
@@ -97,6 +97,10 @@
9797
"type": "WEB",
9898
"url": "https://github.com/electron/electron/security/advisories/GHSA-8x5q-pvf5-64mp"
9999
},
100+
{
101+
"type": "ADVISORY",
102+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34764"
103+
},
100104
{
101105
"type": "PACKAGE",
102106
"url": "https://github.com/electron/electron"
@@ -109,6 +113,6 @@
109113
"severity": "LOW",
110114
"github_reviewed": true,
111115
"github_reviewed_at": "2026-04-03T21:52:33Z",
112-
"nvd_published_at": null
116+
"nvd_published_at": "2026-04-06T16:16:36Z"
113117
}
114118
}

advisories/github-reviewed/2026/04/GHSA-jjhc-v7c2-5hh6/GHSA-jjhc-v7c2-5hh6.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jjhc-v7c2-5hh6",
4-
"modified": "2026-04-03T21:59:50Z",
4+
"modified": "2026-04-06T23:40:39Z",
55
"published": "2026-04-03T21:59:50Z",
66
"aliases": [
77
"CVE-2026-35030"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/BerriAI/litellm/security/advisories/GHSA-jjhc-v7c2-5hh6"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35030"
46+
},
4347
{
4448
"type": "PACKAGE",
4549
"url": "https://github.com/BerriAI/litellm"
@@ -52,6 +56,6 @@
5256
"severity": "CRITICAL",
5357
"github_reviewed": true,
5458
"github_reviewed_at": "2026-04-03T21:59:50Z",
55-
"nvd_published_at": null
59+
"nvd_published_at": "2026-04-06T17:17:12Z"
5660
}
5761
}

advisories/github-reviewed/2026/04/GHSA-qcmw-8mm4-4p28/GHSA-qcmw-8mm4-4p28.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qcmw-8mm4-4p28",
4-
"modified": "2026-04-03T04:02:47Z",
4+
"modified": "2026-04-06T23:40:30Z",
55
"published": "2026-04-03T04:02:47Z",
66
"aliases": [
77
"CVE-2026-34992"
@@ -78,6 +78,10 @@
7878
"type": "WEB",
7979
"url": "https://github.com/antrea-io/antrea/security/advisories/GHSA-qcmw-8mm4-4p28"
8080
},
81+
{
82+
"type": "ADVISORY",
83+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34992"
84+
},
8185
{
8286
"type": "WEB",
8387
"url": "https://github.com/antrea-io/antrea/pull/7757"
@@ -106,6 +110,6 @@
106110
"severity": "HIGH",
107111
"github_reviewed": true,
108112
"github_reviewed_at": "2026-04-03T04:02:47Z",
109-
"nvd_published_at": null
113+
"nvd_published_at": "2026-04-06T17:17:12Z"
110114
}
111115
}

advisories/github-reviewed/2026/04/GHSA-vr2g-rhm5-q4jr/GHSA-vr2g-rhm5-q4jr.json

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vr2g-rhm5-q4jr",
4-
"modified": "2026-04-03T04:00:57Z",
4+
"modified": "2026-04-06T23:40:24Z",
55
"published": "2026-04-03T04:00:57Z",
66
"aliases": [
77
"CVE-2026-34989"
@@ -43,19 +43,23 @@
4343
"type": "WEB",
4444
"url": "https://github.com/ci4-cms-erp/ci4ms/security/advisories/GHSA-vr2g-rhm5-q4jr"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34989"
49+
},
4650
{
4751
"type": "PACKAGE",
4852
"url": "https://github.com/ci4-cms-erp/ci4ms"
4953
}
5054
],
5155
"database_specific": {
5256
"cwe_ids": [
53-
"CWE-79",
54-
"CWE-269"
57+
"CWE-269",
58+
"CWE-79"
5559
],
5660
"severity": "CRITICAL",
5761
"github_reviewed": true,
5862
"github_reviewed_at": "2026-04-03T04:00:57Z",
59-
"nvd_published_at": null
63+
"nvd_published_at": "2026-04-06T17:17:12Z"
6064
}
6165
}

advisories/github-reviewed/2026/04/GHSA-wc4h-2348-jc3p/GHSA-wc4h-2348-jc3p.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-wc4h-2348-jc3p",
4-
"modified": "2026-04-03T03:30:53Z",
4+
"modified": "2026-04-06T23:41:04Z",
55
"published": "2026-04-03T03:30:53Z",
66
"aliases": [
77
"CVE-2026-35036"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/lin-snow/Ech0/security/advisories/GHSA-wc4h-2348-jc3p"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35036"
46+
},
4347
{
4448
"type": "PACKAGE",
4549
"url": "https://github.com/lin-snow/Ech0"
@@ -52,6 +56,6 @@
5256
"severity": "HIGH",
5357
"github_reviewed": true,
5458
"github_reviewed_at": "2026-04-03T03:30:53Z",
55-
"nvd_published_at": null
59+
"nvd_published_at": "2026-04-06T17:17:12Z"
5660
}
5761
}

0 commit comments

Comments
 (0)