Skip to content

Commit a8b9490

Browse files
1 parent 0066eef commit a8b9490

8 files changed

Lines changed: 84 additions & 16 deletions

File tree

advisories/github-reviewed/2026/03/GHSA-7f6v-3gx7-27q8/GHSA-7f6v-3gx7-27q8.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7f6v-3gx7-27q8",
4-
"modified": "2026-03-20T17:25:56Z",
4+
"modified": "2026-03-27T21:58:58Z",
55
"published": "2026-03-20T17:25:56Z",
66
"aliases": [
77
"CVE-2026-33331"
@@ -43,9 +43,21 @@
4343
"type": "WEB",
4444
"url": "https://github.com/middleapi/orpc/security/advisories/GHSA-7f6v-3gx7-27q8"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33331"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://github.com/middleapi/orpc/commit/4f0efa8a1d3fa8e8317a4b03cc3945a5dfd68add"
53+
},
4654
{
4755
"type": "PACKAGE",
4856
"url": "https://github.com/middleapi/orpc"
57+
},
58+
{
59+
"type": "WEB",
60+
"url": "https://github.com/middleapi/orpc/releases/tag/v1.13.9"
4961
}
5062
],
5163
"database_specific": {
@@ -55,6 +67,6 @@
5567
"severity": "HIGH",
5668
"github_reviewed": true,
5769
"github_reviewed_at": "2026-03-20T17:25:56Z",
58-
"nvd_published_at": null
70+
"nvd_published_at": "2026-03-24T20:16:28Z"
5971
}
6072
}

advisories/github-reviewed/2026/03/GHSA-hh8v-hgvp-g3f5/GHSA-hh8v-hgvp-g3f5.json

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hh8v-hgvp-g3f5",
4-
"modified": "2026-03-20T21:25:29Z",
4+
"modified": "2026-03-27T21:58:03Z",
55
"published": "2026-03-19T19:04:24Z",
66
"aliases": [
77
"CVE-2026-33347"
88
],
99
"summary": "league/commonmark has an embed extension allowed_domains bypass",
10-
"details": "### Impact\n\nThe `DomainFilteringAdapter` in the Embed extension is vulnerable to an allowlist bypass due to a missing hostname boundary assertion in the domain-matching regex. An attacker-controlled domain like `youtube.com.evil` passes the allowlist check when `youtube.com` is an allowed domain.\n\nThis enables two attack vectors:\n\n- **SSRF**: The `OscaroteroEmbedAdapter` makes server-side HTTP requests to the embed URL via the `embed/embed` library. A bypassed domain filter causes the server to make outbound requests to an attacker-controlled host, potentially probing internal services or exfiltrating request metadata.\n- **XSS**: `EmbedRenderer` outputs the oEmbed response HTML directly into the page with no sanitization. An attacker controlling the bypassed domain can return arbitrary HTML/JavaScript in their oEmbed response, which is rendered verbatim.\n\nAny application using the `Embed` extension and relying on `allowed_domains` to restrict domains when processing untrusted Markdown input is affected.\n\n### Patches\n\nThis has been patched in version **2.8.2**. The fix replaces the regex-based domain check with explicit hostname parsing using `parse_url()`, ensuring exact domain and subdomain matching only.\n\n### Workarounds\n\n- Disable the `Embed` extension, or restrict its use to trusted users\n- Provide your own domain-filtering implementation of `EmbedAdapterInterface`\n- Enable a [Content Security Policy (CSP)](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) and outbound firewall restrictions\n\n### References\n\n- https://commonmark.thephpleague.com/2.x/extensions/embed/#configuration",
10+
"details": "### Impact\n\nThe `DomainFilteringAdapter` in the Embed extension is vulnerable to an allowlist bypass due to a missing hostname boundary assertion in the domain-matching regex. An attacker-controlled domain like `youtube.com.evil` passes the allowlist check when `youtube.com` is an allowed domain.\n\nThis enables two attack vectors:\n\n- **SSRF**: The `OscaroteroEmbedAdapter` makes server-side HTTP requests to the embed URL via the `embed/embed` library. A bypassed domain filter causes the server to make outbound requests to an attacker-controlled host, potentially probing internal services or exfiltrating request metadata.\n- **XSS**: `EmbedRenderer` outputs the oEmbed response HTML directly into the page with no sanitization. An attacker controlling the bypassed domain can return arbitrary HTML/JavaScript in their oEmbed response, which is rendered verbatim.\n\nAny application using the `Embed` extension and relying on `allowed_domains` to restrict domains when processing untrusted Markdown input is affected.\n\n### Patches\n\nThis has been patched in version **2.8.2**. The fix replaces the regex-based domain check with explicit hostname parsing using `parse_url()`, ensuring exact domain and subdomain matching only.\n\n### Workarounds\n\n- Disable the `Embed` extension, or restrict its use to trusted users\n- Provide your own domain-filtering implementation of `EmbedAdapterInterface`\n- Enable a [Content Security Policy (CSP)](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) and outbound firewall restrictions",
1111
"severity": [
1212
{
1313
"type": "CVSS_V4",
@@ -43,9 +43,21 @@
4343
"type": "WEB",
4444
"url": "https://github.com/thephpleague/commonmark/security/advisories/GHSA-hh8v-hgvp-g3f5"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33347"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://github.com/thephpleague/commonmark/commit/59fb075d2101740c337c7216e3f32b36c204218b"
53+
},
4654
{
4755
"type": "PACKAGE",
4856
"url": "https://github.com/thephpleague/commonmark"
57+
},
58+
{
59+
"type": "WEB",
60+
"url": "https://github.com/thephpleague/commonmark/releases/tag/2.8.2"
4961
}
5062
],
5163
"database_specific": {
@@ -57,6 +69,6 @@
5769
"severity": "MODERATE",
5870
"github_reviewed": true,
5971
"github_reviewed_at": "2026-03-19T19:04:24Z",
60-
"nvd_published_at": null
72+
"nvd_published_at": "2026-03-24T20:16:29Z"
6173
}
6274
}

advisories/github-reviewed/2026/03/GHSA-jv87-32hw-hh99/GHSA-jv87-32hw-hh99.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jv87-32hw-hh99",
4-
"modified": "2026-03-20T20:47:54Z",
4+
"modified": "2026-03-27T21:59:08Z",
55
"published": "2026-03-20T20:47:54Z",
66
"aliases": [
77
"CVE-2026-33419"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/minio/minio/security/advisories/GHSA-jv87-32hw-hh99"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33419"
46+
},
4347
{
4448
"type": "PACKAGE",
4549
"url": "https://github.com/minio/minio"
@@ -53,6 +57,6 @@
5357
"severity": "CRITICAL",
5458
"github_reviewed": true,
5559
"github_reviewed_at": "2026-03-20T20:47:54Z",
56-
"nvd_published_at": null
60+
"nvd_published_at": "2026-03-24T20:16:29Z"
5761
}
5862
}

advisories/github-reviewed/2026/03/GHSA-ph8x-4jfv-v9v8/GHSA-ph8x-4jfv-v9v8.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-ph8x-4jfv-v9v8",
4-
"modified": "2026-03-19T19:25:44Z",
4+
"modified": "2026-03-27T21:57:52Z",
55
"published": "2026-03-19T19:25:44Z",
66
"aliases": [
77
"CVE-2026-33344"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/dagu-org/dagu/security/advisories/GHSA-ph8x-4jfv-v9v8"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33344"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/dagu-org/dagu/commit/7d07fda8f9de3ae73dfb081ccd0639f8059c56bb"
@@ -56,6 +60,6 @@
5660
"severity": "HIGH",
5761
"github_reviewed": true,
5862
"github_reviewed_at": "2026-03-19T19:25:44Z",
59-
"nvd_published_at": null
63+
"nvd_published_at": "2026-03-24T20:16:28Z"
6064
}
6165
}

advisories/github-reviewed/2026/03/GHSA-pv9c-9mfh-hvxq/GHSA-pv9c-9mfh-hvxq.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-pv9c-9mfh-hvxq",
4-
"modified": "2026-03-24T19:13:41Z",
4+
"modified": "2026-03-27T22:00:24Z",
55
"published": "2026-03-24T19:13:41Z",
66
"aliases": [
77
"CVE-2026-33635"
@@ -40,13 +40,21 @@
4040
"type": "WEB",
4141
"url": "https://github.com/icalendar/icalendar/security/advisories/GHSA-pv9c-9mfh-hvxq"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33635"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/icalendar/icalendar/commit/b8d23b490363ee5fffaec1d269a8618a912ca265"
4650
},
4751
{
4852
"type": "PACKAGE",
4953
"url": "https://github.com/icalendar/icalendar"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/icalendar/CVE-2026-33635.yml"
5058
}
5159
],
5260
"database_specific": {
@@ -56,6 +64,6 @@
5664
"severity": "MODERATE",
5765
"github_reviewed": true,
5866
"github_reviewed_at": "2026-03-24T19:13:41Z",
59-
"nvd_published_at": null
67+
"nvd_published_at": "2026-03-26T21:17:07Z"
6068
}
6169
}

advisories/github-reviewed/2026/03/GHSA-r7mc-x6x7-cqxx/GHSA-r7mc-x6x7-cqxx.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-r7mc-x6x7-cqxx",
4-
"modified": "2026-03-20T21:50:30Z",
4+
"modified": "2026-03-27T21:59:17Z",
55
"published": "2026-03-20T21:50:30Z",
66
"aliases": [
77
"CVE-2026-33509"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/pyload/pyload/security/advisories/GHSA-r7mc-x6x7-cqxx"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33509"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/pyload/pyload/commit/f5e284fcdfeaf08436bb03e5fcf697aaac659d8b"
@@ -56,6 +60,6 @@
5660
"severity": "HIGH",
5761
"github_reviewed": true,
5862
"github_reviewed_at": "2026-03-20T21:50:30Z",
59-
"nvd_published_at": null
63+
"nvd_published_at": "2026-03-24T20:16:30Z"
6064
}
6165
}

advisories/github-reviewed/2026/03/GHSA-v2wj-7wpq-c8vv/GHSA-v2wj-7wpq-c8vv.json

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-v2wj-7wpq-c8vv",
4-
"modified": "2026-03-05T20:25:12Z",
4+
"modified": "2026-03-27T21:59:55Z",
55
"published": "2026-03-03T18:31:33Z",
66
"aliases": [
77
"CVE-2026-0540"
@@ -69,14 +69,26 @@
6969
"type": "ADVISORY",
7070
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0540"
7171
},
72+
{
73+
"type": "WEB",
74+
"url": "https://github.com/cure53/DOMPurify/commit/302b51de22535cc90235472c52e3401bedd46f80"
75+
},
7276
{
7377
"type": "WEB",
7478
"url": "https://github.com/cure53/DOMPurify/commit/fca0a938b4261ddc9c0293a289935a9029c049f5"
7579
},
80+
{
81+
"type": "WEB",
82+
"url": "https://fluidattacks.com/advisories/daft"
83+
},
7684
{
7785
"type": "PACKAGE",
7886
"url": "https://github.com/cure53/DOMPurify"
7987
},
88+
{
89+
"type": "WEB",
90+
"url": "https://github.com/cure53/DOMPurify/releases/tag/3.3.2"
91+
},
8092
{
8193
"type": "WEB",
8294
"url": "https://www.vulncheck.com/advisories/dompurify-xss-via-missing-rawtext-elements-in-safe-for-xml"

advisories/github-reviewed/2026/03/GHSA-xgxp-f695-6vrp/GHSA-xgxp-f695-6vrp.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xgxp-f695-6vrp",
4-
"modified": "2026-03-19T19:27:58Z",
4+
"modified": "2026-03-27T21:58:26Z",
55
"published": "2026-03-19T19:27:58Z",
66
"aliases": [
77
"CVE-2026-33353"
@@ -40,9 +40,21 @@
4040
"type": "WEB",
4141
"url": "https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-xgxp-f695-6vrp"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33353"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/charmbracelet/soft-serve/commit/c147421caf234bcfc1570c79d728ecbbe5813e55"
50+
},
4351
{
4452
"type": "PACKAGE",
4553
"url": "https://github.com/charmbracelet/soft-serve"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://github.com/charmbracelet/soft-serve/releases/tag/v0.11.6"
4658
}
4759
],
4860
"database_specific": {
@@ -53,6 +65,6 @@
5365
"severity": "HIGH",
5466
"github_reviewed": true,
5567
"github_reviewed_at": "2026-03-19T19:27:58Z",
56-
"nvd_published_at": null
68+
"nvd_published_at": "2026-03-24T20:16:29Z"
5769
}
5870
}

0 commit comments

Comments
 (0)