Skip to content

File tree

8 files changed

+381
-19
lines changed

8 files changed

+381
-19
lines changed

advisories/unreviewed/2026/04/GHSA-4phw-6824-6cfp/GHSA-4phw-6824-6cfp.json renamed to advisories/github-reviewed/2026/04/GHSA-4phw-6824-6cfp/GHSA-4phw-6824-6cfp.json

Lines changed: 29 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4phw-6824-6cfp",
4-
"modified": "2026-04-10T06:31:37Z",
4+
"modified": "2026-04-10T22:09:31Z",
55
"published": "2026-04-10T03:31:10Z",
66
"aliases": [
77
"CVE-2026-33551"
88
],
9+
"summary": "OpenStack Keystone: Restricted application credentials can create EC2 credentials",
910
"details": "An issue was discovered in OpenStack Keystone 14 through 26 before 26.1.1, 27.0.0, 28.0.0, and 29.0.0. Restricted application credentials can create EC2 credentials. By using a restricted application credential to call the EC2 credential creation API, an authenticated user with only a reader role may obtain an EC2/S3 credential that carries the full set of the parent user's S3 permissions, effectively bypassing the role restrictions imposed on the application credential. Only deployments that use restricted application credentials in combination with the EC2/S3 compatibility API (swift3 / s3api) are affected.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "keystone"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "14.0.0"
29+
},
30+
{
31+
"fixed": "26.1.1"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -23,6 +44,10 @@
2344
"type": "WEB",
2445
"url": "https://bugs.launchpad.net/keystone/+bug/2142138"
2546
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/openstack/keystone"
50+
},
2651
{
2752
"type": "WEB",
2853
"url": "https://security.openstack.org/ossa/OSSA-2026-005.html"
@@ -37,8 +62,8 @@
3762
"CWE-863"
3863
],
3964
"severity": "LOW",
40-
"github_reviewed": false,
41-
"github_reviewed_at": null,
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2026-04-10T22:09:31Z",
4267
"nvd_published_at": "2026-04-10T03:16:02Z"
4368
}
4469
}

advisories/unreviewed/2026/04/GHSA-52vj-fvrv-7q82/GHSA-52vj-fvrv-7q82.json renamed to advisories/github-reviewed/2026/04/GHSA-52vj-fvrv-7q82/GHSA-52vj-fvrv-7q82.json

Lines changed: 28 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-52vj-fvrv-7q82",
4-
"modified": "2026-04-10T06:31:38Z",
4+
"modified": "2026-04-10T22:10:22Z",
55
"published": "2026-04-10T06:31:38Z",
66
"aliases": [
77
"CVE-2026-6011"
88
],
9+
"summary": "OpenClaw vulnerable to SSRF in src/agents/tools/web-fetch.ts",
910
"details": "A weakness has been identified in OpenClaw up to 2026.1.26. Affected by this issue is some unknown functionality of the file src/agents/tools/web-fetch.ts of the component assertPublicHostname Handler. Executing a manipulation can lead to server-side request forgery. The attack can be executed remotely. This attack is characterized by high complexity. The exploitation is known to be difficult. The exploit has been made available to the public and could be used for attacks. Upgrading to version 2026.1.29 can resolve this issue. This patch is called b623557a2ec7e271bda003eb3ac33fbb2e218505. Upgrading the affected component is advised.",
1011
"severity": [
1112
{
@@ -14,10 +15,30 @@
1415
},
1516
{
1617
"type": "CVSS_V4",
17-
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "npm",
25+
"name": "openclaw"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"fixed": "2026.1.29"
36+
}
37+
]
38+
}
39+
]
1840
}
1941
],
20-
"affected": [],
2142
"references": [
2243
{
2344
"type": "ADVISORY",
@@ -28,7 +49,7 @@
2849
"url": "https://github.com/openclaw/openclaw/commit/b623557a2ec7e271bda003eb3ac33fbb2e218505#diff-06572a96a58dc510037d5efa622f9bec8519bc1beab13c9f251e97e657a9d4edR44"
2950
},
3051
{
31-
"type": "WEB",
52+
"type": "PACKAGE",
3253
"url": "https://github.com/openclaw/openclaw"
3354
},
3455
{
@@ -56,9 +77,9 @@
5677
"cwe_ids": [
5778
"CWE-918"
5879
],
59-
"severity": "MODERATE",
60-
"github_reviewed": false,
61-
"github_reviewed_at": null,
80+
"severity": "LOW",
81+
"github_reviewed": true,
82+
"github_reviewed_at": "2026-04-10T22:10:02Z",
6283
"nvd_published_at": "2026-04-10T05:16:06Z"
6384
}
6485
}
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-55v6-g8pm-pw4c",
4+
"modified": "2026-04-10T22:09:15Z",
5+
"published": "2026-04-10T22:09:15Z",
6+
"aliases": [],
7+
"summary": "rembg server is vulnerable to Server-Side Request Forgery (SSRF) and a weak default CORS configuration",
8+
"details": "# GitHub Security Lab (GHSL) Vulnerability Report, rembg: `GHSL-2024-161`, `GHSL-2024-162`\n\nThe [GitHub Security Lab](https://securitylab.github.com) team has identified potential security vulnerabilities in [rembg](https://github.com/danielgatis/rembg).\n\nWe are committed to working with you to help resolve these issues. In this report you will find everything you need to effectively coordinate a resolution of these issues with the GHSL team.\n\nIf at any point you have concerns or questions about this process, please do not hesitate to reach out to us at `securitylab@github.com` (please include `GHSL-2024-161` or `GHSL-2024-162` as a reference). See also [this blog post](https://github.blog/2022-04-22-removing-the-stigma-of-a-cve/) written by GitHub's Advisory Curation team which explains what CVEs and advisories are, why they are important to track vulnerabilities and keep downstream users informed, the CVE assigning process, and how they are used to keep open source software secure.\n\nIf you are _NOT_ the correct point of contact for this report, please let us know!\n\n## Summary\n\nrembg server is vulnerable to Server-Side Request Forgery (SSRF) and a weak default CORS configuration, which may allow an attacker website to send requests to servers on the internal network and view image responses.\n\n## Project\n\nrembg\n\n## Tested Version\n\n[v2.0.57](https://github.com/danielgatis/rembg/releases/tag/v2.0.57)\n\n## Details\n\n### Issue 1: SSRF via `/api/remove` (`GHSL-2024-161`)\n\nThe [`/api/remove`](https://github.com/danielgatis/rembg/blob/d1e00734f8a996abf512a3a5c251c7a9a392c90a/rembg/commands/s_command.py#L237) endpoint takes a URL query parameter that allows an image to be fetched, processed and returned. An attacker may be able to query this endpoint to view pictures hosted on the internal network of the rembg server.\n\n```python\n async def get_index(\n url: str = Query(\n default=..., description=\"URL of the image that has to be processed.\"\n ),\n commons: CommonQueryParams = Depends(),\n ):\n async with aiohttp.ClientSession() as session:\n async with session.get(url) as response:\n file = await response.read()\n return await asyncify(im_without_bg)(file, commons)\n```\n\n#### Impact\n\nThis issue may lead to `Information Disclosure`.\n\n#### Remediation\n\nEnsure that the IP address specified is not a local address. If resolving a domain name, ensure that the resolved IP address is not local.\n\n#### Proof of Concept\n\n`curl -s \"http://localhost:7000/api/remove?url=http://0.0.0.0/secret.png\" -o output.png`\n\n\n### Issue 2: CORS misconfiguration (`GHSL-2024-162`)\n\nThe following [CORS middleware](https://github.com/danielgatis/rembg/blob/d1e00734f8a996abf512a3a5c251c7a9a392c90a/rembg/commands/s_command.py#L93) is setup incorrectly. All origins are reflected, which allows any website to send cross site requests to the rembg server and thus query any API. Even if authentication were to be enabled, `allow_credentials` is set to True, which would allow any website to send authenticated cross site requests.\n\n```python\n app.add_middleware(\n CORSMiddleware,\n allow_credentials=True,\n allow_origins=[\"*\"],\n allow_methods=[\"*\"],\n allow_headers=[\"*\"],\n )\n\n```\n\n#### Impact\n\nThis issue may increase the severity of other vulnerabilities.\n\n#### Remediation\n\nCreate an allowlist of specific endpoints that can send cross site requests to the rembg server.\n\n#### Proof of Concept\n\nAn attacker website can host the following code:\n```javascript\nconst response = await fetch(\"http://localhost:7000/api/remove?url=https://0.0.0.0/secret.jpg\");\n```\nIf a victim running rembg server were to access the attacker website, the attacker website could read the file `secret.jpg` from the server hosted on the victim's internal network.\n\n## GitHub Security Advisories\n\nWe recommend you create a private [GitHub Security Advisory](https://help.github.com/en/github/managing-security-vulnerabilities/creating-a-security-advisory) for these findings. This also allows you to invite the GHSL team to collaborate and further discuss these findings in private before they are [published](https://help.github.com/en/github/managing-security-vulnerabilities/publishing-a-security-advisory).\n\n## Credit\n\nThese issues were discovered and reported by GHSL team member [@Kwstubbs (Kevin Stubbings)](https://github.com/Kwstubbs).\n\n## Contact\n\nYou can contact the GHSL team at `securitylab@github.com`, please include a reference to `GHSL-2024-161` or `GHSL-2024-162` in any communication regarding these issues.\n\n## Disclosure Policy\n\nThis report is subject to a 90-day disclosure deadline, as described in more detail in our [coordinated disclosure policy](https://securitylab.github.com/advisories#policy).",
9+
"severity": [
10+
{
11+
"type": "CVSS_V3",
12+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "PyPI",
19+
"name": "rembg"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "0"
27+
},
28+
{
29+
"fixed": "2.0.75"
30+
}
31+
]
32+
}
33+
]
34+
}
35+
],
36+
"references": [
37+
{
38+
"type": "WEB",
39+
"url": "https://github.com/danielgatis/rembg/security/advisories/GHSA-55v6-g8pm-pw4c"
40+
},
41+
{
42+
"type": "WEB",
43+
"url": "https://github.com/danielgatis/rembg/commit/07ad0d493057bddf821dcc3e2410eb7e065257c0"
44+
},
45+
{
46+
"type": "PACKAGE",
47+
"url": "https://github.com/danielgatis/rembg"
48+
},
49+
{
50+
"type": "WEB",
51+
"url": "https://github.com/danielgatis/rembg/releases/tag/v2.0.75"
52+
}
53+
],
54+
"database_specific": {
55+
"cwe_ids": [
56+
"CWE-918"
57+
],
58+
"severity": "MODERATE",
59+
"github_reviewed": true,
60+
"github_reviewed_at": "2026-04-10T22:09:15Z",
61+
"nvd_published_at": null
62+
}
63+
}

advisories/unreviewed/2026/04/GHSA-8wrq-fv5f-pfp2/GHSA-8wrq-fv5f-pfp2.json renamed to advisories/github-reviewed/2026/04/GHSA-8wrq-fv5f-pfp2/GHSA-8wrq-fv5f-pfp2.json

Lines changed: 29 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8wrq-fv5f-pfp2",
4-
"modified": "2026-04-10T09:31:15Z",
4+
"modified": "2026-04-10T22:11:10Z",
55
"published": "2026-04-10T09:31:15Z",
66
"aliases": [
77
"CVE-2026-1115"
88
],
9+
"summary": "parisneo/lollms vulnerable to stored XSS in the social feature",
910
"details": "A Stored Cross-Site Scripting (XSS) vulnerability was identified in the social feature of parisneo/lollms, affecting the latest version prior to 2.2.0. The vulnerability exists in the `create_post` function within `backend/routers/social/__init__.py`, where user-provided content is directly assigned to the `DBPost` model without sanitization. This allows attackers to inject and store malicious JavaScript, which is executed in the browsers of users viewing the Home Feed, including administrators. This can lead to account takeover, session hijacking, and wormable attacks. The issue is resolved in version 2.2.0.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "lollms"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "2.2.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -23,6 +44,10 @@
2344
"type": "WEB",
2445
"url": "https://github.com/parisneo/lollms/commit/9767b882dbc893c388a286856beeaead69b8292a"
2546
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/ParisNeo/lollms"
50+
},
2651
{
2752
"type": "WEB",
2853
"url": "https://huntr.com/bounties/099aa4fe-7165-4337-889c-3fb4f1aa71aa"
@@ -33,8 +58,8 @@
3358
"CWE-79"
3459
],
3560
"severity": "CRITICAL",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2026-04-10T22:11:10Z",
3863
"nvd_published_at": "2026-04-10T07:16:20Z"
3964
}
4065
}
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-9cp7-j3f8-p5jx",
4+
"modified": "2026-04-10T22:11:04Z",
5+
"published": "2026-04-10T22:11:04Z",
6+
"aliases": [],
7+
"summary": "Daptin has Unauthenticated Path Traversal and Zip Slip",
8+
"details": "### Impact\nThe `cloudstore.file.upload` action in `server/actions/action_cloudstore_file_upload.go` writes user-supplied filenames directly to disk without proper validation. \n\nThis allows unauthenticated attackers to perform path traversal and zip slip attacks, leading to arbitrary file write and potential remote code execution.\n\n**CVSS Score:** 10.0 Critical\n**CVSS Vector:** CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H\n**CWE:** CWE-22 (Path Traversal)\n\n### Patches\n\nUpgrade to a patched version once released. The vulnerability affects all versions <= v0.11.3 (latest).\n\n### Workarounds\n\nRestrict access to the cloudstore.file.upload action through authentication and authorization controls until a patch is available.",
9+
"severity": [
10+
{
11+
"type": "CVSS_V3",
12+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "Go",
19+
"name": "github.com/daptin/daptin"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "0"
27+
},
28+
{
29+
"fixed": "0.12.0"
30+
}
31+
]
32+
}
33+
],
34+
"database_specific": {
35+
"last_known_affected_version_range": "<= 0.11.3"
36+
}
37+
}
38+
],
39+
"references": [
40+
{
41+
"type": "WEB",
42+
"url": "https://github.com/daptin/daptin/security/advisories/GHSA-9cp7-j3f8-p5jx"
43+
},
44+
{
45+
"type": "WEB",
46+
"url": "https://github.com/daptin/daptin/commit/8d626bbb14f82160a08cbca53e0749f475f5742c"
47+
},
48+
{
49+
"type": "PACKAGE",
50+
"url": "https://github.com/daptin/daptin"
51+
}
52+
],
53+
"database_specific": {
54+
"cwe_ids": [
55+
"CWE-22"
56+
],
57+
"severity": "CRITICAL",
58+
"github_reviewed": true,
59+
"github_reviewed_at": "2026-04-10T22:11:04Z",
60+
"nvd_published_at": null
61+
}
62+
}

0 commit comments

Comments
 (0)