Skip to content

Commit a3d5f73

Browse files

File tree

6 files changed

+58
-16
lines changed

6 files changed

+58
-16
lines changed

advisories/github-reviewed/2023/07/GHSA-wxf3-4fvj-vqqx/GHSA-wxf3-4fvj-vqqx.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-wxf3-4fvj-vqqx",
4-
"modified": "2023-09-06T19:20:43Z",
4+
"modified": "2026-01-16T21:55:54Z",
55
"published": "2023-07-27T19:28:02Z",
66
"aliases": [],
77
"summary": "Unsafe plugins can be installed via pack import by tenant admins",
8-
"details": "### Summary\nUnsafe plugins (for instance `sql-list`) can be installed in subdomain tenants via pack import even if unsafe plugin installation for tenants is disables\n\n### Details\nI have an example\nhttps://bot20230704.saltcorn.com/view/all_plugins\nIt's publicly accessible (but has not so secure values except list of tenants).\nBut using this mech one can read **any** data from other tenants.\n\n### Impact\nAll tenants of installation (i.e. `saltcorn.com`), can be compromised from tenant user has admin access. If an untrusted user has admin rights to a tenant instance, they will be able to install a plug-in that can access information from other tenants\n\n### Revived after 0.8.7\nAfter patch in 0.8.7 this is not fixed completely.\n\nHere are steps to reproduce:\n1. Publish to NPM plugin that was not approved by admin (in case of saltcorn.com) by @glutamate. I've just published this one: https://www.npmjs.com/package/saltcorn-qrcode\n2. Publish somewhere plugin store that includes plugin from previous step: https://gist.github.com/pyhedgehog/f1fd7cb13f4d0a7ccf6a965748d19bd2\n3. Add plugin store link to tenant store.\n4. Install plugin.\n5. Use it in tenant: https://bot20230704.saltcorn.com/view/testqr_show/1\n\nHere are logic:\nUnsafe plugins checked against this list:\nhttps://github.com/saltcorn/saltcorn/blob/99fe277e497fd193bb070acd8c663aa254a9907c/packages/server/load_plugins.js#L191\nBut it's under control of tenant admin, not server admin.\nProposed login:\n```javascript\nconst safes = getRootState().getConfig(\"available_plugins\",[]).filter(p=>!p.unsafe).map(p=>p.location);\n```\n",
8+
"details": "### Summary\nUnsafe plugins (for instance `sql-list`) can be installed in subdomain tenants via pack import even if unsafe plugin installation for tenants is disables\n\n### Details\nI have an example\nhttps://bot20230704.saltcorn.com/view/all_plugins\nIt's publicly accessible (but has not so secure values except list of tenants).\nBut using this mech one can read **any** data from other tenants.\n\n### Impact\nAll tenants of installation (i.e. `saltcorn.com`), can be compromised from tenant user has admin access. If an untrusted user has admin rights to a tenant instance, they will be able to install a plug-in that can access information from other tenants\n\n### Revived after 0.8.7\nAfter patch in 0.8.7 this is not fixed completely.\n\nHere are steps to reproduce:\n1. Publish to NPM plugin that was not approved by admin (in case of saltcorn.com) by @glutamate. I've just published this one: https://www.npmjs.com/package/saltcorn-qrcode\n2. Publish somewhere plugin store that includes plugin from previous step: https://gist.github.com/pyhedgehog/f1fd7cb13f4d0a7ccf6a965748d19bd2\n3. Add plugin store link to tenant store.\n4. Install plugin.\n5. Use it in tenant: https://bot20230704.saltcorn.com/view/testqr_show/1\n\nHere are logic:\nUnsafe plugins checked against this list:\nhttps://github.com/saltcorn/saltcorn/blob/99fe277e497fd193bb070acd8c663aa254a9907c/packages/server/load_plugins.js#L191\nBut it's under control of tenant admin, not server admin.\nProposed login:\n```javascript\nconst safes = getRootState().getConfig(\"available_plugins\",[]).filter(p=>!p.unsafe).map(p=>p.location);\n```",
99
"severity": [
1010
{
1111
"type": "CVSS_V3",
@@ -26,7 +26,7 @@
2626
"introduced": "0"
2727
},
2828
{
29-
"fixed": "1.0"
29+
"fixed": "0.8.8-beta.2"
3030
}
3131
]
3232
}

advisories/github-reviewed/2026/01/GHSA-63vm-454h-vhhq/GHSA-63vm-454h-vhhq.json

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-63vm-454h-vhhq",
4-
"modified": "2026-01-16T19:19:25Z",
4+
"modified": "2026-01-16T21:55:59Z",
55
"published": "2026-01-16T19:19:25Z",
66
"aliases": [
77
"CVE-2026-23490"
@@ -43,6 +43,14 @@
4343
"type": "WEB",
4444
"url": "https://github.com/pyasn1/pyasn1/security/advisories/GHSA-63vm-454h-vhhq"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23490"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://github.com/pyasn1/pyasn1/commit/3908f144229eed4df24bd569d16e5991ace44970"
53+
},
4654
{
4755
"type": "WEB",
4856
"url": "https://github.com/pyasn1/pyasn1/commit/be353d755f42ea36539b4f5053c652ddf56979a6"
@@ -62,11 +70,12 @@
6270
],
6371
"database_specific": {
6472
"cwe_ids": [
65-
"CWE-400"
73+
"CWE-400",
74+
"CWE-770"
6675
],
6776
"severity": "HIGH",
6877
"github_reviewed": true,
6978
"github_reviewed_at": "2026-01-16T19:19:25Z",
70-
"nvd_published_at": null
79+
"nvd_published_at": "2026-01-16T19:16:19Z"
7180
}
7281
}

advisories/github-reviewed/2026/01/GHSA-mmwx-79f6-67jg/GHSA-mmwx-79f6-67jg.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-mmwx-79f6-67jg",
4-
"modified": "2026-01-16T16:58:26Z",
4+
"modified": "2026-01-16T21:56:08Z",
55
"published": "2026-01-16T16:58:26Z",
66
"aliases": [
77
"CVE-2026-23535"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/WeblateOrg/wlc/security/advisories/GHSA-mmwx-79f6-67jg"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23535"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/WeblateOrg/wlc/pull/1128"
@@ -51,6 +55,10 @@
5155
{
5256
"type": "PACKAGE",
5357
"url": "https://github.com/WeblateOrg/wlc"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://github.com/WeblateOrg/wlc/releases/tag/1.17.2"
5462
}
5563
],
5664
"database_specific": {
@@ -60,6 +68,6 @@
6068
"severity": "HIGH",
6169
"github_reviewed": true,
6270
"github_reviewed_at": "2026-01-16T16:58:26Z",
63-
"nvd_published_at": null
71+
"nvd_published_at": "2026-01-16T19:16:19Z"
6472
}
6573
}

advisories/github-reviewed/2026/01/GHSA-pcjq-j3mq-jv5j/GHSA-pcjq-j3mq-jv5j.json

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-pcjq-j3mq-jv5j",
4-
"modified": "2026-01-16T19:22:08Z",
4+
"modified": "2026-01-16T21:56:47Z",
55
"published": "2026-01-16T19:22:08Z",
66
"aliases": [
77
"CVE-2026-23645"
@@ -10,8 +10,8 @@
1010
"details": "### Summary\nA Stored Cross-Site Scripting (XSS) vulnerability exists in SiYuan Note. The application does not sanitize uploaded SVG files. If a user uploads and views a malicious SVG file (e.g., imported from an untrusted source), arbitrary JavaScript code is executed in the context of their authenticated session.\n\n### Details\nThe application allows authenticated users to upload files, including .svg images, without sanitizing the input to remove embedded JavaScript code (such as <script> tags or event handlers).\n\n### PoC\n1. Create a new \"Daily note\" in the workspace.\n<img width=\"1287\" height=\"572\" alt=\"image\" src=\"https://github.com/user-attachments/assets/3a4389b9-695d-4e1b-94dc-72efdb047aa9\" />\n2. Create a file named test.svg with malicious JavaScript inside:\n\n```\n<svg xmlns=\"http://www.w3.org/2000/svg\" width=\"200\" height=\"200\" viewBox=\"0 0 124 124\" fill=\"none\">\n<rect width=\"124\" height=\"124\" rx=\"24\" fill=\"red\"/>\n <script type=\"text/javascript\"> \n alert(window.origin);\n </script>\n</svg>\n```\n3. Upload a file in current daily note:\n<img width=\"1617\" height=\"316\" alt=\"image\" src=\"https://github.com/user-attachments/assets/6e14318a-08ec-48e5-b278-9174ad17cfcb\" />\n<img width=\"1482\" height=\"739\" alt=\"image\" src=\"https://github.com/user-attachments/assets/95c996e8-5591-436a-9467-ab56c9ffbde0\" />\n<img width=\"1321\" height=\"548\" alt=\"image\" src=\"https://github.com/user-attachments/assets/249fb187-3caa-4372-a9c9-56dfda6b8a8f\" />\n4. Open the file:\n\n- Right-click the uploaded asset in the note.\n- Select \"Export\"\n<img width=\"934\" height=\"718\" alt=\"image\" src=\"https://github.com/user-attachments/assets/ec943dfa-92ba-47f6-8b1e-56e53f1b0ca6\" />\n5. The JavaScript code executes immediately.\n<img width=\"1033\" height=\"632\" alt=\"image\" src=\"https://github.com/user-attachments/assets/a1611291-d333-4f8e-9da9-62104aaa1bdd\" />\n<img width=\"1381\" height=\"641\" alt=\"image\" src=\"https://github.com/user-attachments/assets/d5018203-dbd0-4285-8702-8cb3e7c5cd07\" />\n\n### Impact\nThe vulnerability allows to upload an SVG file containing malicious scripts. When a user exports this file, the embedded arbitrary JavaScript code is executed within their browser context\n\n### Notes\nTested version: \n<img width=\"1440\" height=\"534\" alt=\"image\" src=\"https://github.com/user-attachments/assets/a62271e4-6850-4f59-be88-c4f8055429c0\" />\n\n### Solution\n\nhttps://github.com/siyuan-note/siyuan/issues/16844",
1111
"severity": [
1212
{
13-
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"
1515
}
1616
],
1717
"affected": [
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/siyuan-note/siyuan/security/advisories/GHSA-pcjq-j3mq-jv5j"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23645"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/siyuan-note/siyuan/issues/16844"
@@ -60,6 +64,6 @@
6064
"severity": "MODERATE",
6165
"github_reviewed": true,
6266
"github_reviewed_at": "2026-01-16T19:22:08Z",
63-
"nvd_published_at": null
67+
"nvd_published_at": "2026-01-16T20:15:49Z"
6468
}
6569
}

advisories/github-reviewed/2026/01/GHSA-vrgw-pc9c-qrrc/GHSA-vrgw-pc9c-qrrc.json

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vrgw-pc9c-qrrc",
4-
"modified": "2026-01-13T19:54:05Z",
4+
"modified": "2026-01-16T21:54:55Z",
55
"published": "2026-01-13T19:54:05Z",
66
"aliases": [
77
"CVE-2025-68924"
@@ -40,9 +40,25 @@
4040
"type": "WEB",
4141
"url": "https://github.com/umbraco/Umbraco.Forms.Issues/security/advisories/GHSA-vrgw-pc9c-qrrc"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68924"
46+
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://github.com/advisories/GHSA-vrgw-pc9c-qrrc"
50+
},
4351
{
4452
"type": "PACKAGE",
4553
"url": "https://github.com/umbraco/Umbraco.Forms.Issues"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://our.umbraco.com/packages/developer-tools/umbraco-forms"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://www.nuget.org/packages/UmbracoForms"
4662
}
4763
],
4864
"database_specific": {
@@ -55,6 +71,6 @@
5571
"severity": "CRITICAL",
5672
"github_reviewed": true,
5773
"github_reviewed_at": "2026-01-13T19:54:05Z",
58-
"nvd_published_at": null
74+
"nvd_published_at": "2026-01-16T19:16:18Z"
5975
}
6076
}

advisories/github-reviewed/2026/01/GHSA-w54x-r83c-x79q/GHSA-w54x-r83c-x79q.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-w54x-r83c-x79q",
4-
"modified": "2026-01-16T15:21:14Z",
4+
"modified": "2026-01-16T21:56:18Z",
55
"published": "2026-01-15T20:14:31Z",
66
"aliases": [
77
"CVE-2026-23634"
@@ -44,6 +44,10 @@
4444
"type": "WEB",
4545
"url": "https://github.com/defenseunicorns/pepr/security/advisories/GHSA-w54x-r83c-x79q"
4646
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23634"
50+
},
4751
{
4852
"type": "WEB",
4953
"url": "https://github.com/defenseunicorns/pepr/pull/2883"
@@ -63,11 +67,12 @@
6367
],
6468
"database_specific": {
6569
"cwe_ids": [
70+
"CWE-272",
6671
"CWE-276"
6772
],
6873
"severity": "LOW",
6974
"github_reviewed": true,
7075
"github_reviewed_at": "2026-01-15T20:14:31Z",
71-
"nvd_published_at": null
76+
"nvd_published_at": "2026-01-16T20:15:49Z"
7277
}
7378
}

0 commit comments

Comments
 (0)