Skip to content

Commit c67fca6

Browse files
1 parent 7f3b97a commit c67fca6

3 files changed

Lines changed: 104 additions & 13 deletions

File tree

advisories/unreviewed/2026/04/GHSA-77rh-m34w-rv36/GHSA-77rh-m34w-rv36.json renamed to advisories/github-reviewed/2026/04/GHSA-77rh-m34w-rv36/GHSA-77rh-m34w-rv36.json

Lines changed: 30 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-77rh-m34w-rv36",
4-
"modified": "2026-04-02T15:31:43Z",
4+
"modified": "2026-04-04T06:02:27Z",
55
"published": "2026-04-02T15:31:43Z",
66
"aliases": [
77
"CVE-2026-35002"
88
],
9+
"summary": "Agno is vulnerable to Eval Injection",
910
"details": "Agno versions prior to 2.3.24 contain an arbitrary code execution vulnerability in the model execution component that allows attackers to execute arbitrary Python code by manipulating the field_type parameter passed to eval(). Attackers can influence the field_type value in a FunctionCall to achieve remote code execution.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V4",
13-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "agno"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "2.3.24"
32+
}
33+
]
34+
}
35+
]
1436
}
1537
],
16-
"affected": [],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -23,6 +44,10 @@
2344
"type": "WEB",
2445
"url": "https://github.com/agno-agi/agno/commit/cbf675521d4d2281925a051784a3b94172e56416"
2546
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/agno-agi/agno"
50+
},
2651
{
2752
"type": "WEB",
2853
"url": "https://github.com/agno-agi/agno/releases/tag/v2.3.24"
@@ -37,8 +62,8 @@
3762
"CWE-95"
3863
],
3964
"severity": "CRITICAL",
40-
"github_reviewed": false,
41-
"github_reviewed_at": null,
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2026-04-04T06:02:27Z",
4267
"nvd_published_at": "2026-04-02T15:16:52Z"
4368
}
4469
}

advisories/unreviewed/2026/04/GHSA-f2hx-5fx3-hmcv/GHSA-f2hx-5fx3-hmcv.json renamed to advisories/github-reviewed/2026/04/GHSA-f2hx-5fx3-hmcv/GHSA-f2hx-5fx3-hmcv.json

Lines changed: 37 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,53 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-f2hx-5fx3-hmcv",
4-
"modified": "2026-04-02T18:31:37Z",
4+
"modified": "2026-04-04T06:00:14Z",
55
"published": "2026-04-02T15:31:39Z",
66
"aliases": [
77
"CVE-2026-4636"
88
],
9+
"summary": "Keycloak: UMA Policy Resource Injection Allows Unauthorized Cross-User Permission Grants",
910
"details": "A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, even if the URL path specifies an attacker-owned resource. Consequently, the attacker gains unauthorized permissions to victim-owned resources, enabling them to obtain a Requesting Party Token (RPT) and access sensitive information or perform unauthorized actions.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.keycloak:keycloak-services"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "26.5.7"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4636"
2142
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/keycloak/keycloak/issues/47717"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/keycloak/keycloak/commit/995832f8b74b02833d106c8788bb7a78634aa725"
50+
},
2251
{
2352
"type": "WEB",
2453
"url": "https://access.redhat.com/errata/RHSA-2026:6475"
@@ -42,15 +71,19 @@
4271
{
4372
"type": "WEB",
4473
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450251"
74+
},
75+
{
76+
"type": "PACKAGE",
77+
"url": "https://github.com/keycloak/keycloak"
4578
}
4679
],
4780
"database_specific": {
4881
"cwe_ids": [
4982
"CWE-551"
5083
],
5184
"severity": "HIGH",
52-
"github_reviewed": false,
53-
"github_reviewed_at": null,
85+
"github_reviewed": true,
86+
"github_reviewed_at": "2026-04-04T06:00:14Z",
5487
"nvd_published_at": "2026-04-02T13:16:27Z"
5588
}
5689
}

advisories/unreviewed/2026/04/GHSA-h4wv-g838-66g3/GHSA-h4wv-g838-66g3.json renamed to advisories/github-reviewed/2026/04/GHSA-h4wv-g838-66g3/GHSA-h4wv-g838-66g3.json

Lines changed: 37 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,53 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-h4wv-g838-66g3",
4-
"modified": "2026-04-02T18:31:37Z",
4+
"modified": "2026-04-04T06:00:47Z",
55
"published": "2026-04-02T15:31:39Z",
66
"aliases": [
77
"CVE-2026-4634"
88
],
9+
"summary": "Keycloak: Application-Level DoS via Scope Processing",
910
"details": "A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request with an excessively long scope parameter to the OpenID Connect (OIDC) token endpoint. This leads to high resource consumption and prolonged processing times, ultimately resulting in a Denial of Service (DoS) for the Keycloak server.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.keycloak:keycloak-services"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "26.5.7"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4634"
2142
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/keycloak/keycloak/issues/47716"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/keycloak/keycloak/commit/b455ee4f28abb6f2120aff72fd179589cc5267a0"
50+
},
2251
{
2352
"type": "WEB",
2453
"url": "https://access.redhat.com/errata/RHSA-2026:6475"
@@ -42,15 +71,19 @@
4271
{
4372
"type": "WEB",
4473
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450250"
74+
},
75+
{
76+
"type": "PACKAGE",
77+
"url": "https://github.com/keycloak/keycloak"
4578
}
4679
],
4780
"database_specific": {
4881
"cwe_ids": [
4982
"CWE-1050"
5083
],
5184
"severity": "HIGH",
52-
"github_reviewed": false,
53-
"github_reviewed_at": null,
85+
"github_reviewed": true,
86+
"github_reviewed_at": "2026-04-04T06:00:47Z",
5487
"nvd_published_at": "2026-04-02T13:16:27Z"
5588
}
5689
}

0 commit comments

Comments
 (0)