@openrewrite/recipes-nodejs 0.43.0-20260409-115929 → 0.43.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/resources/advisories-npm.csv +444 -96
- package/package.json +1 -1
|
@@ -997,7 +997,7 @@ CVE-2020-10544,2021-05-07T16:16:30Z,"Cross-site Scripting in PrimeFaces",primefa
|
|
|
997
997
|
CVE-2020-10800,2020-04-16T03:14:59Z,"Machine-In-The-Middle in lix",lix,0,,15.11.4,HIGH,CWE-544;CWE-639,
|
|
998
998
|
CVE-2020-11003,2020-04-16T03:14:39Z,"CSRF and DNS Rebinding in Oasis",@fraction/oasis,0,2.15.0,,MODERATE,CWE-352,
|
|
999
999
|
CVE-2020-11021,2020-04-29T17:58:53Z,"Http request which redirect to another hostname do not strip authorization header in @actions/http-client",@actions/http-client,0,1.0.8,,MODERATE,CWE-200,
|
|
1000
|
-
CVE-2020-11022,2020-04-29T22:18:55Z,"Potential XSS vulnerability in jQuery",jquery,1.
|
|
1000
|
+
CVE-2020-11022,2020-04-29T22:18:55Z,"Potential XSS vulnerability in jQuery",jquery,1.12.0,3.5.0,,MODERATE,CWE-79,
|
|
1001
1001
|
CVE-2020-11023,2020-04-29T22:19:14Z,"Potential XSS vulnerability in jQuery",jquery,1.0.3,3.5.0,,MODERATE,CWE-79,
|
|
1002
1002
|
CVE-2020-11059,2020-05-27T21:09:15Z,"Exposure of Sensitive Information to an Unauthorized Actor in AEgir",aegir,21.7.0,21.10.1,,CRITICAL,CWE-200,
|
|
1003
1003
|
CVE-2020-11071,2020-05-12T00:39:03Z,"False-negative validation results in MINT transactions with invalid baton",slpjs,0,0.27.2,,CRITICAL,CWE-697,
|
|
@@ -3652,6 +3652,7 @@ CVE-2025-13465,2026-01-21T23:01:22Z,"Lodash has Prototype Pollution Vulnerabilit
|
|
|
3652
3652
|
CVE-2025-13465,2026-01-21T23:01:22Z,"Lodash has Prototype Pollution Vulnerability in `_.unset` and `_.omit` functions",lodash-es,4.0.0,4.17.23,,MODERATE,CWE-1321,
|
|
3653
3653
|
CVE-2025-13465,2026-01-21T23:01:22Z,"Lodash has Prototype Pollution Vulnerability in `_.unset` and `_.omit` functions",lodash.unset,4.0.0,,4.5.2,MODERATE,CWE-1321,
|
|
3654
3654
|
CVE-2025-13466,2025-11-25T14:20:21Z,"body-parser is vulnerable to denial of service when url encoding is used",body-parser,2.2.0,2.2.1,,MODERATE,CWE-400,
|
|
3655
|
+
CVE-2025-13822,2026-04-14T12:31:28Z,"MCPHub has an authentication bypass",@samanhappy/mcphub,0,0.11.0,,MODERATE,CWE-639,
|
|
3655
3656
|
CVE-2025-13877,2025-12-09T17:42:53Z,"Authentication Bypass via Default JWT Secret in NocoBase docker-compose Deployments",@nocobase/auth,0,1.9.0-beta.18,,MODERATE,CWE-1320;CWE-321,
|
|
3656
3657
|
CVE-2025-13877,2025-12-09T17:42:53Z,"Authentication Bypass via Default JWT Secret in NocoBase docker-compose Deployments",@nocobase/auth,1.9.0,1.9.23,,MODERATE,CWE-1320;CWE-321,
|
|
3657
3658
|
CVE-2025-13877,2025-12-09T17:42:53Z,"Authentication Bypass via Default JWT Secret in NocoBase docker-compose Deployments",@nocobase/auth,2.0.0-alpha.1,2.0.0-alpha.52,,MODERATE,CWE-1320;CWE-321,
|
|
@@ -4102,7 +4103,7 @@ CVE-2025-56265,2025-09-08T18:31:42Z,"N8N's Chat Trigger component is vulnerable
|
|
|
4102
4103
|
CVE-2025-56571,2025-09-30T18:30:24Z,"Finance.js vulnerable to DoS via the IRR function’s depth parameter",financejs,0,,4.1.0,HIGH,CWE-400;CWE-770;CWE-834,
|
|
4103
4104
|
CVE-2025-56572,2025-09-30T18:30:24Z,"Finance.js vulnerable to DoS via the seekZero() parameter",financejs,0,,4.1.0,HIGH,CWE-400;CWE-770,
|
|
4104
4105
|
CVE-2025-56647,2026-02-12T18:30:23Z,"@farmfe/core is Missing Origin Validation in WebSocket",@farmfe/core,0,1.7.6,,MODERATE,CWE-1385,
|
|
4105
|
-
CVE-2025-56648,2025-09-17T21:30:42Z,"Parcel has an Origin Validation Error vulnerability","@parcel/reporter-dev-server",1.6.1
|
|
4106
|
+
CVE-2025-56648,2025-09-17T21:30:42Z,"Parcel has an Origin Validation Error vulnerability","@parcel/reporter-dev-server",1.6.1,2.16.4,,MODERATE,CWE-346,
|
|
4106
4107
|
CVE-2025-57164,2025-09-15T19:51:08Z,"FlowiseAI Pre-Auth Arbitrary Code Execution",flowise,3.0.5,3.0.6,,CRITICAL,CWE-94,
|
|
4107
4108
|
CVE-2025-57283,2026-01-28T18:30:47Z,"BrowserStack Local vulnerable to Command Injection through logfile variable",browserstack-local,0,1.5.9,,MODERATE,CWE-77,
|
|
4108
4109
|
CVE-2025-57285,2025-09-08T18:31:42Z,"CodeceptJS's incomprehensive sanitation can lead to Command Injection",codeceptjs,3.5.0,3.7.5,,CRITICAL,CWE-77,
|
|
@@ -4224,20 +4225,20 @@ CVE-2025-59430,2025-09-22T21:09:27Z,"Mesh Connect JS SDK Vulnerable to Cross Sit
|
|
|
4224
4225
|
CVE-2025-59433,2025-09-22T18:01:01Z,"@conventional-changelog/git-client has Argument Injection vulnerability","@conventional-changelog/git-client",0,2.0.0,,MODERATE,CWE-88,
|
|
4225
4226
|
CVE-2025-59471,2026-01-27T19:18:25Z,"Next.js self-hosted applications vulnerable to DoS via Image Optimizer remotePatterns configuration",next,10.0.0,15.5.10,,MODERATE,CWE-400;CWE-770,
|
|
4226
4227
|
CVE-2025-59471,2026-01-27T19:18:25Z,"Next.js self-hosted applications vulnerable to DoS via Image Optimizer remotePatterns configuration",next,15.6.0-canary.0,16.1.5,,MODERATE,CWE-400;CWE-770,
|
|
4227
|
-
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.0.0-canary.0
|
|
4228
|
-
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.0.1-canary.0
|
|
4229
|
-
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.0.2-canary.0
|
|
4230
|
-
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.0.3-canary.0
|
|
4231
|
-
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.0.4-canary.0
|
|
4232
|
-
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.1.1-canary.0
|
|
4233
|
-
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.2.0-canary.0
|
|
4234
|
-
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.2.1-canary.0
|
|
4235
|
-
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.2.2-canary.0
|
|
4236
|
-
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.3.0-canary.0
|
|
4237
|
-
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.3.1-canary.0
|
|
4238
|
-
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.4.0-canary.0
|
|
4239
|
-
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.4.2-canary.0
|
|
4240
|
-
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.5.1-canary.0
|
|
4228
|
+
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.0.0-canary.0,,15.0.0-canary.205,MODERATE,CWE-400;CWE-409;CWE-770,
|
|
4229
|
+
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.0.1-canary.0,,15.0.1-canary.3,MODERATE,CWE-400;CWE-409;CWE-770,
|
|
4230
|
+
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.0.2-canary.0,,15.0.2-canary.11,MODERATE,CWE-400;CWE-409;CWE-770,
|
|
4231
|
+
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.0.3-canary.0,,15.0.3-canary.9,MODERATE,CWE-400;CWE-409;CWE-770,
|
|
4232
|
+
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.0.4-canary.0,,15.0.4-canary.52,MODERATE,CWE-400;CWE-409;CWE-770,
|
|
4233
|
+
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.1.1-canary.0,,15.1.1-canary.27,MODERATE,CWE-400;CWE-409;CWE-770,
|
|
4234
|
+
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.2.0-canary.0,,15.2.0-canary.77,MODERATE,CWE-400;CWE-409;CWE-770,
|
|
4235
|
+
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.2.1-canary.0,,15.2.1-canary.6,MODERATE,CWE-400;CWE-409;CWE-770,
|
|
4236
|
+
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.2.2-canary.0,,15.2.2-canary.7,MODERATE,CWE-400;CWE-409;CWE-770,
|
|
4237
|
+
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.3.0-canary.0,,15.3.0-canary.46,MODERATE,CWE-400;CWE-409;CWE-770,
|
|
4238
|
+
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.3.1-canary.0,,15.3.1-canary.15,MODERATE,CWE-400;CWE-409;CWE-770,
|
|
4239
|
+
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.4.0-canary.0,,15.4.0-canary.130,MODERATE,CWE-400;CWE-409;CWE-770,
|
|
4240
|
+
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.4.2-canary.0,,15.4.2-canary.56,MODERATE,CWE-400;CWE-409;CWE-770,
|
|
4241
|
+
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.5.1-canary.0,,15.5.1-canary.39,MODERATE,CWE-400;CWE-409;CWE-770,
|
|
4241
4242
|
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,15.6.0-canary.0,15.6.0-canary.61,,MODERATE,CWE-400;CWE-409;CWE-770,
|
|
4242
4243
|
CVE-2025-59472,2026-01-28T15:20:55Z,"Next.js has Unbounded Memory Consumption via PPR Resume Endpoint ",next,16.0.0-beta.0,16.1.5,,MODERATE,CWE-400;CWE-409;CWE-770,
|
|
4243
4244
|
CVE-2025-59526,2025-09-22T18:03:47Z,"Mailgen: HTML injection vulnerability in plaintext e-mails",mailgen,0,2.0.30,,MODERATE,CWE-79,
|
|
@@ -4263,6 +4264,7 @@ CVE-2025-60542,2025-10-29T18:30:33Z,"TypeORM vulnerable to SQL injection via cra
|
|
|
4263
4264
|
CVE-2025-60794,2025-11-20T15:30:24Z,"@perfood/couch-auth may expose session tokens, passwords",@perfood/couch-auth,0,,0.21.2,MODERATE,CWE-316,
|
|
4264
4265
|
CVE-2025-6087,2025-06-16T19:37:16Z,"OpenNext for Cloudflare (opennextjs-cloudflare) has a SSRF vulnerability via /_next/image endpoint",@opennextjs/cloudflare,0,1.3.0,,HIGH,CWE-918,
|
|
4265
4266
|
CVE-2025-61140,2026-01-28T18:30:47Z,"JSONPath vulnerable to Prototype Pollution due to insufficient input validation of object keys in lib/index.js",jsonpath,0,1.2.0,,MODERATE,CWE-1321,
|
|
4267
|
+
CVE-2025-61260,2026-04-14T15:30:34Z,"OpenAI Codex CLI enables code execution through malicious MCP (Model Context Protocol) configuration files",@openai/codex,0,,0.23.0,CRITICAL,CWE-94,
|
|
4266
4268
|
CVE-2025-61668,2025-10-01T15:53:43Z," @plone/volto vulnerable to potential DoS by invoking specific URL by anonymous user ",@plone/volto,0,16.34.1,,HIGH,CWE-476;CWE-754,
|
|
4267
4269
|
CVE-2025-61668,2025-10-01T15:53:43Z," @plone/volto vulnerable to potential DoS by invoking specific URL by anonymous user ",@plone/volto,17.0.0,17.22.2,,HIGH,CWE-476;CWE-754,
|
|
4268
4270
|
CVE-2025-61668,2025-10-01T15:53:43Z," @plone/volto vulnerable to potential DoS by invoking specific URL by anonymous user ",@plone/volto,18.0.0,18.27.2,,HIGH,CWE-476;CWE-754,
|
|
@@ -4303,6 +4305,8 @@ CVE-2025-62595,2025-10-21T15:09:06Z,"Koa Vulnerable to Open Redirect via Trailin
|
|
|
4303
4305
|
CVE-2025-62595,2025-10-21T15:09:06Z,"Koa Vulnerable to Open Redirect via Trailing Double-Slash (//) in back Redirect Logic",koa,3.0.1,3.0.3,,MODERATE,CWE-601,
|
|
4304
4306
|
CVE-2025-62610,2025-10-22T15:21:18Z,"Hono Improper Authorization vulnerability",hono,1.1.0,4.10.2,,HIGH,CWE-285,
|
|
4305
4307
|
CVE-2025-62713,2025-10-23T16:01:35Z,"Kottster app reinitialization can be re-triggered allowing command injection in development mode",@kottster/server,3.2.0,3.3.2,,HIGH,CWE-284;CWE-78,
|
|
4308
|
+
CVE-2025-62718,2026-04-09T17:32:19Z,"Axios has a NO_PROXY Hostname Normalization Bypass that Leads to SSRF",axios,0,0.31.0,,MODERATE,CWE-441;CWE-918,
|
|
4309
|
+
CVE-2025-62718,2026-04-09T17:32:19Z,"Axios has a NO_PROXY Hostname Normalization Bypass that Leads to SSRF",axios,1.0.0,1.15.0,,MODERATE,CWE-441;CWE-918,
|
|
4306
4310
|
CVE-2025-62726,2025-10-30T17:04:26Z,"n8n Vulnerable to Remote Code Execution via Git Node Pre-Commit Hook",n8n,0,1.113.0,,HIGH,CWE-829,
|
|
4307
4311
|
CVE-2025-63700,2025-11-20T21:30:32Z,"Clerk-js vulnerable to bypass of OAuth authentication flow by manipulating request at OTP verification stage",@clerk/clerk-js,0,,5.88.0,MODERATE,CWE-290;CWE-639,
|
|
4308
4312
|
CVE-2025-64118,2025-10-30T17:13:17Z,"node-tar has a race condition leading to uninitialized memory exposure",tar,7.5.1,7.5.2,,MODERATE,CWE-362,
|
|
@@ -4565,7 +4569,7 @@ CVE-2026-22172,2026-03-13T20:55:24Z,"OpenClaw: WebSocket shared-auth connections
|
|
|
4565
4569
|
CVE-2026-22174,2026-03-03T21:50:34Z,"OpenClaw Loopback CDP probe can leak Gateway token to local listener",openclaw,0,2026.2.22,,MODERATE,CWE-290;CWE-306,
|
|
4566
4570
|
CVE-2026-22175,2026-03-02T22:30:43Z,"OpenClaw's exec allow-always can be bypassed via unrecognized multiplexer shell wrappers (busybox/toybox sh -c)",openclaw,0,2026.2.23,,MODERATE,CWE-184,
|
|
4567
4571
|
CVE-2026-22176,2026-03-03T21:50:05Z,"OpenClaw has a Command Injection via unescaped environment assignments in Windows Scheduled Task script generation",openclaw,0,2026.2.19,,HIGH,CWE-78,
|
|
4568
|
-
CVE-2026-22177,2026-03-03T19:53:02Z,"OpenClaw's config env vars allowed startup env injection into service runtime",openclaw,0,2026.2.21,,
|
|
4572
|
+
CVE-2026-22177,2026-03-03T19:53:02Z,"OpenClaw's config env vars allowed startup env injection into service runtime",openclaw,0,2026.2.21,,MODERATE,CWE-15,
|
|
4569
4573
|
CVE-2026-22178,2026-03-02T22:17:30Z,"OpenClaw has ReDoS and regex injection via unescaped Feishu mention metadata in RegExp construction",openclaw,0,2026.2.19,,MODERATE,CWE-1333,
|
|
4570
4574
|
CVE-2026-22179,2026-03-03T21:41:12Z,"OpenClaw has macOS `system.run` allowlist bypass via quoted command substitution",openclaw,0,2026.2.22,,HIGH,CWE-78,
|
|
4571
4575
|
CVE-2026-22180,2026-03-03T21:20:01Z,"OpenClaw: Unified root-bound write hardening for browser output and related path-boundary flows",openclaw,0,2026.3.2,,MODERATE,CWE-367;CWE-59,
|
|
@@ -4639,6 +4643,15 @@ CVE-2026-23864,2026-01-29T15:00:30Z,"React Server Components have multiple Denia
|
|
|
4639
4643
|
CVE-2026-23864,2026-01-29T15:00:30Z,"React Server Components have multiple Denial of Service Vulnerabilities",react-server-dom-webpack,"19.1.0-canary-7130d0c6-20241212",19.1.5,,HIGH,CWE-400,
|
|
4640
4644
|
CVE-2026-23864,2026-01-29T15:00:30Z,"React Server Components have multiple Denial of Service Vulnerabilities",react-server-dom-webpack,"19.2.0-canary-63779030-20250328",19.2.4,,HIGH,CWE-400,
|
|
4641
4645
|
CVE-2026-23864,2026-01-29T15:00:30Z,"React Server Components have multiple Denial of Service Vulnerabilities",react-server-dom-webpack,19.0.0,19.0.4,,HIGH,CWE-400,
|
|
4646
|
+
CVE-2026-23869,2026-04-10T15:35:37Z,"React Server Components have a Denial of Service Vulnerability","react-server-dom-turbopack",19.0.0,19.0.5,,HIGH,CWE-400;CWE-502,
|
|
4647
|
+
CVE-2026-23869,2026-04-10T15:35:37Z,"React Server Components have a Denial of Service Vulnerability","react-server-dom-turbopack",19.1.0,19.1.6,,HIGH,CWE-400;CWE-502,
|
|
4648
|
+
CVE-2026-23869,2026-04-10T15:35:37Z,"React Server Components have a Denial of Service Vulnerability","react-server-dom-turbopack",19.2.0,19.2.5,,HIGH,CWE-400;CWE-502,
|
|
4649
|
+
CVE-2026-23869,2026-04-10T15:35:37Z,"React Server Components have a Denial of Service Vulnerability",react-server-dom-parcel,19.0.0,19.0.5,,HIGH,CWE-400;CWE-502,
|
|
4650
|
+
CVE-2026-23869,2026-04-10T15:35:37Z,"React Server Components have a Denial of Service Vulnerability",react-server-dom-parcel,19.1.0,19.1.6,,HIGH,CWE-400;CWE-502,
|
|
4651
|
+
CVE-2026-23869,2026-04-10T15:35:37Z,"React Server Components have a Denial of Service Vulnerability",react-server-dom-parcel,19.2.0,19.2.5,,HIGH,CWE-400;CWE-502,
|
|
4652
|
+
CVE-2026-23869,2026-04-10T15:35:37Z,"React Server Components have a Denial of Service Vulnerability",react-server-dom-webpack,19.0.0,19.0.5,,HIGH,CWE-400;CWE-502,
|
|
4653
|
+
CVE-2026-23869,2026-04-10T15:35:37Z,"React Server Components have a Denial of Service Vulnerability",react-server-dom-webpack,19.1.0,19.1.6,,HIGH,CWE-400;CWE-502,
|
|
4654
|
+
CVE-2026-23869,2026-04-10T15:35:37Z,"React Server Components have a Denial of Service Vulnerability",react-server-dom-webpack,19.2.0,19.2.5,,HIGH,CWE-400;CWE-502,
|
|
4642
4655
|
CVE-2026-23888,2026-01-26T21:02:49Z,"pnpm: Binary ZIP extraction allows arbitrary file write via path traversal (Zip Slip)",pnpm,0,10.28.1,,MODERATE,CWE-22;CWE-23;CWE-426,
|
|
4643
4656
|
CVE-2026-23889,2026-01-26T21:02:44Z,"pnpm has Windows-specific tarball Path Traversal",pnpm,0,10.28.1,,MODERATE,CWE-22,
|
|
4644
4657
|
CVE-2026-23890,2026-01-26T21:02:39Z,"pnpm scoped bin name Path Traversal allows arbitrary file creation outside node_modules/.bin",pnpm,0,10.28.1,,MODERATE,CWE-23,
|
|
@@ -4767,7 +4780,7 @@ CVE-2026-25641,2026-02-05T21:33:04Z,"@nyariv/sandboxjs vulnerable to sandbox esc
|
|
|
4767
4780
|
CVE-2026-25651,2026-02-06T18:54:33Z,"client-certificate-auth Vulnerable to Open Redirect via Host Header Injection in HTTP-to-HTTPS redirect",client-certificate-auth,0.2.1,1.0.0,,MODERATE,CWE-601,
|
|
4768
4781
|
CVE-2026-25722,2026-02-06T19:02:41Z,"Claude Code Vulnerable to Command Injection via Directory Change Bypasses Write Protection","@anthropic-ai/claude-code",0,2.0.57,,HIGH,CWE-20;CWE-78,
|
|
4769
4782
|
CVE-2026-25723,2026-02-06T19:04:51Z,"Claude Code Vulnerable to Command Injection via Piped sed Command Bypasses File Write Restrictions","@anthropic-ai/claude-code",0,2.0.55,,HIGH,CWE-20;CWE-78,
|
|
4770
|
-
CVE-2026-25724,2026-02-06T19:08:04Z,"Claude Code has Permission Deny Bypass Through Symbolic Links","@anthropic-ai/claude-code",0,2.1.7,,LOW,CWE-
|
|
4783
|
+
CVE-2026-25724,2026-02-06T19:08:04Z,"Claude Code has Permission Deny Bypass Through Symbolic Links","@anthropic-ai/claude-code",0,2.1.7,,LOW,CWE-285;CWE-61,
|
|
4771
4784
|
CVE-2026-25725,2026-02-06T19:14:33Z,"Claude Code has Sandbox Escape via Persistent Configuration Injection in settings.json","@anthropic-ai/claude-code",0,2.1.2,,HIGH,CWE-501;CWE-668,
|
|
4772
4785
|
CVE-2026-25751,2026-02-05T00:33:44Z,"FUXA Unauthenticated Exposure of Plaintext Database Credentials",fuxa-server,0,1.2.10,,CRITICAL,CWE-306;CWE-312,
|
|
4773
4786
|
CVE-2026-25752,2026-02-05T00:38:25Z,"FUXA Unauthenticated Remote Arbitrary Device Tag Write",fuxa-server,0,1.2.10,,CRITICAL,CWE-862,
|
|
@@ -4971,6 +4984,7 @@ CVE-2026-27978,2026-03-17T15:30:14Z,"Next.js: null origin can bypass Server Acti
|
|
|
4971
4984
|
CVE-2026-27979,2026-03-17T16:16:49Z,"Next.js: Unbounded postponed resume buffering can lead to DoS",next,16.0.1,16.1.7,,MODERATE,CWE-770,
|
|
4972
4985
|
CVE-2026-27980,2026-03-17T16:17:06Z,"Next.js: Unbounded next/image disk cache growth can exhaust storage",next,10.0.0,15.5.14,,MODERATE,CWE-400,
|
|
4973
4986
|
CVE-2026-27980,2026-03-17T16:17:06Z,"Next.js: Unbounded next/image disk cache growth can exhaust storage",next,16.0.0-beta.0,16.1.7,,MODERATE,CWE-400,
|
|
4987
|
+
CVE-2026-28291,2026-04-13T16:35:37Z,"simple-git Affected by Command Execution via Option-Parsing Bypass",simple-git,0,3.32.0,,HIGH,CWE-78,
|
|
4974
4988
|
CVE-2026-28292,2026-03-10T18:38:56Z,"simple-git has blockUnsafeOperationsPlugin bypass via case-insensitive protocol.allow config key enables RCE",simple-git,3.15.0,3.32.3,,CRITICAL,CWE-178;CWE-78,
|
|
4975
4989
|
CVE-2026-28343,2026-03-04T18:49:32Z,"CKEditor 5 has Cross-site Scripting (XSS) in the HTML Support package","@ckeditor/ckeditor5-html-support",29.0.0,47.6.0,,MODERATE,CWE-79,
|
|
4976
4990
|
CVE-2026-28343,2026-03-04T18:49:32Z,"CKEditor 5 has Cross-site Scripting (XSS) in the HTML Support package",ckeditor5,29.0.0,47.6.0,,MODERATE,CWE-79,
|
|
@@ -5157,6 +5171,7 @@ CVE-2026-31818,2026-04-03T21:34:44Z,"Budibase: Server-Side Request Forgery via R
|
|
|
5157
5171
|
CVE-2026-31828,2026-03-11T00:23:21Z,"Parse Server vulnerable to LDAP injection via unsanitized user input in DN and group filter construction",parse-server,0,8.6.26,,MODERATE,CWE-90,
|
|
5158
5172
|
CVE-2026-31828,2026-03-11T00:23:21Z,"Parse Server vulnerable to LDAP injection via unsanitized user input in DN and group filter construction",parse-server,9.0.0-alpha.1,9.5.2-alpha.13,,MODERATE,CWE-90,
|
|
5159
5173
|
CVE-2026-31829,2026-03-11T00:24:05Z,"Flowise affected by Server-Side Request Forgery (SSRF) in HTTP Node Leading to Internal Network Access",flowise,0,3.0.13,,HIGH,CWE-918,
|
|
5174
|
+
CVE-2026-31829,2026-03-11T00:24:05Z,"Flowise affected by Server-Side Request Forgery (SSRF) in HTTP Node Leading to Internal Network Access",flowise-components,0,3.0.13,,HIGH,CWE-918,
|
|
5160
5175
|
CVE-2026-31839,2026-03-11T14:55:49Z,"Striae has a hash validation utility vulnerability",@striae-org/striae,0.9.22-0,3.0.0,,HIGH,CWE-327;CWE-353;CWE-354,
|
|
5161
5176
|
CVE-2026-31840,2026-03-10T18:25:27Z,"Parse Server: SQL injection via dot-notation field name in PostgreSQL",parse-server,0,8.6.28,,CRITICAL,CWE-89,
|
|
5162
5177
|
CVE-2026-31840,2026-03-10T18:25:27Z,"Parse Server: SQL injection via dot-notation field name in PostgreSQL",parse-server,9.0.0,9.6.0-alpha.2,,CRITICAL,CWE-89,
|
|
@@ -5338,11 +5353,20 @@ CVE-2026-32897,2026-03-03T23:01:30Z,"OpenClaw reuses the gateway auth token in t
|
|
|
5338
5353
|
CVE-2026-32898,2026-02-27T22:08:36Z,"OpenClaw ACP client has permission auto-approval bypass via untrusted tool metadata",openclaw,0,2026.2.23,,MODERATE,CWE-639;CWE-863,
|
|
5339
5354
|
CVE-2026-32899,2026-03-03T19:50:26Z,"OpenClaw's Slack reaction/pin sender-policy consistency issue in non-message ingress",openclaw,0,2026.2.25,,MODERATE,CWE-863,
|
|
5340
5355
|
CVE-2026-32913,2026-03-09T19:54:20Z,"OpenClaw: fetch-guard forwards custom authorization headers across cross-origin redirects",openclaw,0,2026.3.7,,HIGH,CWE-116;CWE-184;CWE-522,
|
|
5356
|
+
CVE-2026-32916,2026-03-13T15:47:23Z,"OpenClaw: Plugin subagent routes could bypass gateway authorization with synthetic admin scopes",openclaw,2026.3.7,2026.3.11,,CRITICAL,CWE-269;CWE-285,
|
|
5341
5357
|
CVE-2026-32918,2026-03-13T20:55:19Z,"`OpenClaw: session_status` let sandboxed subagents access parent or sibling session state",openclaw,0,2026.3.11,,HIGH,CWE-863,
|
|
5358
|
+
CVE-2026-32920,2026-03-13T20:55:13Z,"OpenClaw: Workspace plugin auto-discovery allowed code execution from cloned repositories",openclaw,0,2026.3.12,,HIGH,CWE-829,
|
|
5359
|
+
CVE-2026-32921,2026-03-12T14:21:28Z,"OpenClaw's system.run approvals did not bind mutable script operands across approval and execution",openclaw,0,2026.3.8,,MODERATE,CWE-285;CWE-367,
|
|
5342
5360
|
CVE-2026-32943,2026-03-17T17:40:08Z,"Parse Server has a password reset token single-use bypass via concurrent requests",parse-server,0,8.6.48,,LOW,CWE-367,
|
|
5343
5361
|
CVE-2026-32943,2026-03-17T17:40:08Z,"Parse Server has a password reset token single-use bypass via concurrent requests",parse-server,9.0.0,9.6.0-alpha.28,,LOW,CWE-367,
|
|
5344
5362
|
CVE-2026-32944,2026-03-17T17:35:52Z,"Parse Server crash via deeply nested query condition operators",parse-server,0,8.6.45,,HIGH,CWE-674,
|
|
5345
5363
|
CVE-2026-32944,2026-03-17T17:35:52Z,"Parse Server crash via deeply nested query condition operators",parse-server,9.0.0,9.6.0-alpha.21,,HIGH,CWE-674,
|
|
5364
|
+
CVE-2026-32970,2026-03-13T15:48:21Z,"OpenClaw: Unavailable local auth SecretRefs could fall through to remote credentials in local mode",openclaw,0,2026.3.11,,LOW,CWE-636,
|
|
5365
|
+
CVE-2026-32971,2026-03-13T15:47:46Z,"OpenClaw: Node-host approvals could show misleading shell payloads instead of the executed argv",openclaw,0,2026.3.11,,HIGH,CWE-436;CWE-863,
|
|
5366
|
+
CVE-2026-32974,2026-03-13T20:55:34Z,"OpenClaw: Feishu webhook mode accepted forged events when only `verificationToken` was configured",openclaw,0,2026.3.12,,HIGH,CWE-347,
|
|
5367
|
+
CVE-2026-32977,2026-03-13T15:47:15Z,"OpenClaw: Sandbox `writeFile` commit could race outside the validated path",openclaw,0,2026.3.11,,MODERATE,CWE-367,
|
|
5368
|
+
CVE-2026-32978,2026-03-13T15:48:05Z,"OpenClaw: Unrecognized script runners could bypass `system.run` approval integrity",openclaw,0,2026.3.11,,HIGH,CWE-863,
|
|
5369
|
+
CVE-2026-32979,2026-03-13T15:47:41Z,"OpenClaw: Unbound interpreter and runtime commands could bypass node-host approval integrity",openclaw,0,2026.3.11,,HIGH,CWE-367,
|
|
5346
5370
|
CVE-2026-32980,2026-03-16T20:40:57Z,"OpenClaw Telegram webhook request bodies were read before secret validation, enabling unauthenticated resource exhaustion",openclaw,0,2026.3.13,,HIGH,CWE-400;CWE-770,
|
|
5347
5371
|
CVE-2026-33011,2026-03-17T18:38:38Z,"Nest Fastify HEAD Request Middleware Bypass",@nestjs/platform-fastify,0,11.1.16,,HIGH,CWE-670,
|
|
5348
5372
|
CVE-2026-33036,2026-03-17T19:45:41Z,"fast-xml-parser affected by numeric entity expansion bypassing all entity expansion limits (incomplete fix for CVE-2026-26278)",fast-xml-parser,4.0.0-beta.3,4.5.5,,HIGH,CWE-776,
|
|
@@ -5381,7 +5405,8 @@ CVE-2026-33323,2026-03-19T18:21:18Z,"Parse Server email verification resend page
|
|
|
5381
5405
|
CVE-2026-33323,2026-03-19T18:21:18Z,"Parse Server email verification resend page leaks user existence",parse-server,9.0.0,9.6.0-alpha.40,,MODERATE,CWE-204,
|
|
5382
5406
|
CVE-2026-33326,2026-03-19T18:37:42Z,"@keystone-6/core: `isFilterable` bypass via `cursor` parameter in findMany (CVE-2025-46720 incomplete fix)",@keystone-6/core,0,6.5.2,,MODERATE,CWE-863,
|
|
5383
5407
|
CVE-2026-33331,2026-03-20T17:25:56Z,"oRPC has Stored XSS in OpenAPI Reference Plugin via unescaped JSON.stringify",@orpc/openapi,0,1.13.9,,HIGH,CWE-79,
|
|
5384
|
-
CVE-2026-33349,2026-03-19T19:13:13Z,"Entity Expansion Limits Bypassed When Set to Zero Due to JavaScript Falsy Evaluation in fast-xml-parser",fast-xml-parser,4.0.0-beta.3,5.5
|
|
5408
|
+
CVE-2026-33349,2026-03-19T19:13:13Z,"Entity Expansion Limits Bypassed When Set to Zero Due to JavaScript Falsy Evaluation in fast-xml-parser",fast-xml-parser,4.0.0-beta.3,4.5.5,,MODERATE,CWE-1284,
|
|
5409
|
+
CVE-2026-33349,2026-03-19T19:13:13Z,"Entity Expansion Limits Bypassed When Set to Zero Due to JavaScript Falsy Evaluation in fast-xml-parser",fast-xml-parser,5.0.0,5.5.7,,MODERATE,CWE-1284,
|
|
5385
5410
|
CVE-2026-33397,2026-03-19T21:22:52Z,"Protocol-Relative URL Injection via Single Backslash Bypass in Angular SSR",@angular/ssr,20.0.0-next.0,20.3.21,,MODERATE,CWE-601,
|
|
5386
5411
|
CVE-2026-33397,2026-03-19T21:22:52Z,"Protocol-Relative URL Injection via Single Backslash Bypass in Angular SSR",@angular/ssr,21.0.0-next.0,21.2.3,,MODERATE,CWE-601,
|
|
5387
5412
|
CVE-2026-33397,2026-03-19T21:22:52Z,"Protocol-Relative URL Injection via Single Backslash Bypass in Angular SSR",@angular/ssr,22.0.0-next.0,22.0.0-next.2,,MODERATE,CWE-601,
|
|
@@ -5407,17 +5432,21 @@ CVE-2026-33538,2026-03-24T19:11:40Z,"Parse Server: Denial of Service via unindex
|
|
|
5407
5432
|
CVE-2026-33538,2026-03-24T19:11:40Z,"Parse Server: Denial of Service via unindexed database query for unconfigured auth providers",parse-server,9.0.0,9.6.0-alpha.52,,HIGH,CWE-400,
|
|
5408
5433
|
CVE-2026-33539,2026-03-24T19:12:06Z,"Parse Server has SQL Injection through aggregate and distinct field names in PostgreSQL adapter",parse-server,0,8.6.59,,HIGH,CWE-89,
|
|
5409
5434
|
CVE-2026-33539,2026-03-24T19:12:06Z,"Parse Server has SQL Injection through aggregate and distinct field names in PostgreSQL adapter",parse-server,9.0.0,9.6.0-alpha.53,,HIGH,CWE-89,
|
|
5435
|
+
CVE-2026-33572,2026-03-16T20:41:51Z,"OpenClaw session transcript files were created without forced user-only permissions",openclaw,0,2026.2.17,,MODERATE,CWE-276;CWE-732,
|
|
5436
|
+
CVE-2026-33574,2026-03-12T14:21:32Z,"OpenClaw's skills-install-download can be redirected outside the tools root by rebinding the validated base path",openclaw,0,2026.3.8,,MODERATE,CWE-367,
|
|
5410
5437
|
CVE-2026-33576,2026-03-31T23:50:44Z,"OpenClaw: Zalo channel downloads media before sender authorization",openclaw,0,2026.3.28,,MODERATE,CWE-862;CWE-863,
|
|
5411
5438
|
CVE-2026-33577,2026-04-01T00:00:19Z,"OpenClaw: node.pair.approve missing callerScopes validation allows low-privilege operator to approve malicious nodes",openclaw,0,2026.3.28,,MODERATE,CWE-863,
|
|
5412
5439
|
CVE-2026-33578,2026-04-01T00:01:10Z,"OpenClaw: Google Chat and Zalouser group sender allowlist bypass via policy downgrade",openclaw,0,2026.3.28,,MODERATE,CWE-863,
|
|
5440
|
+
CVE-2026-33579,2026-03-31T23:50:22Z,"OpenClaw: /pair approve command path omitted caller scope subsetting and reopened device pairing escalation",openclaw,0,2026.3.28,,CRITICAL,CWE-863,
|
|
5441
|
+
CVE-2026-33580,2026-03-31T23:59:17Z,"OpenClaw's Nextcloud Talk webhook missing rate limiting on shared secret authentication",openclaw,0,2026.3.28,,MODERATE,CWE-307,
|
|
5413
5442
|
CVE-2026-33581,2026-03-31T23:54:28Z,"OpenClaw's message tool media parameter bypasses tool policy filesystem isolation",openclaw,0,2026.3.24,,HIGH,CWE-22,
|
|
5414
5443
|
CVE-2026-33624,2026-03-24T19:48:24Z,"Parse Server: MFA recovery code single-use bypass via concurrent requests",parse-server,0,8.6.60,,LOW,CWE-367,
|
|
5415
5444
|
CVE-2026-33624,2026-03-24T19:48:24Z,"Parse Server: MFA recovery code single-use bypass via concurrent requests",parse-server,9.0.0,9.6.0-alpha.54,,LOW,CWE-367,
|
|
5416
5445
|
CVE-2026-33627,2026-03-24T20:17:02Z,"Parse Server exposes auth data via /users/me endpoint",parse-server,0,8.6.61,,HIGH,CWE-200,
|
|
5417
5446
|
CVE-2026-33627,2026-03-24T20:17:02Z,"Parse Server exposes auth data via /users/me endpoint",parse-server,9.0.0,9.6.0-alpha.55,,HIGH,CWE-200,
|
|
5418
|
-
CVE-2026-33660,2026-03-25T21:07:45Z,"n8n has Multiple Remote Code Execution Vulnerabilities in Merge Node AlaSQL SQL Mode",n8n,0,1.123.27,,CRITICAL,CWE-
|
|
5419
|
-
CVE-2026-33660,2026-03-25T21:07:45Z,"n8n has Multiple Remote Code Execution Vulnerabilities in Merge Node AlaSQL SQL Mode",n8n,2.0.0-rc.0,2.13.3,,CRITICAL,CWE-
|
|
5420
|
-
CVE-2026-33660,2026-03-25T21:07:45Z,"n8n has Multiple Remote Code Execution Vulnerabilities in Merge Node AlaSQL SQL Mode",n8n,2.14.0,2.14.1,,CRITICAL,CWE-
|
|
5447
|
+
CVE-2026-33660,2026-03-25T21:07:45Z,"n8n has Multiple Remote Code Execution Vulnerabilities in Merge Node AlaSQL SQL Mode",n8n,0,1.123.27,,CRITICAL,CWE-89;CWE-94,
|
|
5448
|
+
CVE-2026-33660,2026-03-25T21:07:45Z,"n8n has Multiple Remote Code Execution Vulnerabilities in Merge Node AlaSQL SQL Mode",n8n,2.0.0-rc.0,2.13.3,,CRITICAL,CWE-89;CWE-94,
|
|
5449
|
+
CVE-2026-33660,2026-03-25T21:07:45Z,"n8n has Multiple Remote Code Execution Vulnerabilities in Merge Node AlaSQL SQL Mode",n8n,2.14.0,2.14.1,,CRITICAL,CWE-89;CWE-94,
|
|
5421
5450
|
CVE-2026-33663,2026-03-25T21:08:33Z,"n8n is Vulnerable to Credential Theft via Name-Based Resolution and Permission Checker Bypass in Community Edition",n8n,0,1.123.27,,HIGH,CWE-639,
|
|
5422
5451
|
CVE-2026-33663,2026-03-25T21:08:33Z,"n8n is Vulnerable to Credential Theft via Name-Based Resolution and Permission Checker Bypass in Community Edition",n8n,2.0.0-rc.0,2.13.3,,HIGH,CWE-639,
|
|
5423
5452
|
CVE-2026-33663,2026-03-25T21:08:33Z,"n8n is Vulnerable to Credential Theft via Name-Based Resolution and Permission Checker Bypass in Community Edition",n8n,2.14.0,2.14.1,,HIGH,CWE-639,
|
|
@@ -5451,9 +5480,18 @@ CVE-2026-33751,2026-03-26T18:30:18Z,"n8n Vulnerable to LDAP Filter Injection in
|
|
|
5451
5480
|
CVE-2026-33751,2026-03-26T18:30:18Z,"n8n Vulnerable to LDAP Filter Injection in LDAP Node",n8n,2.0.0-rc.0,2.13.3,,MODERATE,CWE-90,
|
|
5452
5481
|
CVE-2026-33751,2026-03-26T18:30:18Z,"n8n Vulnerable to LDAP Filter Injection in LDAP Node",n8n,2.14.0,2.14.1,,MODERATE,CWE-90,
|
|
5453
5482
|
CVE-2026-33768,2026-03-26T18:41:34Z,"Astro: Unauthenticated Path Override via `x-astro-path` / `x_astro_path`",@astrojs/vercel,0,10.0.2,,MODERATE,CWE-441;CWE-862,
|
|
5454
|
-
CVE-2026-33769,2026-03-26T18:45:17Z,"Astro: Remote allowlist bypass via unanchored matchPathname wildcard",astro,2.10.10,5.18.1,,LOW,CWE-
|
|
5483
|
+
CVE-2026-33769,2026-03-26T18:45:17Z,"Astro: Remote allowlist bypass via unanchored matchPathname wildcard",astro,2.10.10,5.18.1,,LOW,CWE-183;CWE-20,
|
|
5484
|
+
CVE-2026-33804,2026-04-16T22:28:54Z,"@fastify/middie vulnerable to middleware bypass via deprecated ignoreDuplicateSlashes option",@fastify/middie,0,9.3.2,,HIGH,CWE-436,
|
|
5485
|
+
CVE-2026-33805,2026-04-16T01:02:59Z,"Fastify's connection header abuse enables stripping of proxy-added headers",@fastify/http-proxy,0,11.4.4,,CRITICAL,CWE-644,
|
|
5486
|
+
CVE-2026-33805,2026-04-16T01:02:59Z,"Fastify's connection header abuse enables stripping of proxy-added headers",@fastify/reply-from,0,12.6.2,,CRITICAL,CWE-644,
|
|
5487
|
+
CVE-2026-33806,2026-04-15T19:24:41Z,"Fastify has a Body Schema Validation Bypass via Leading Space in Content-Type Header",fastify,5.3.2,5.8.5,,HIGH,CWE-1287,
|
|
5488
|
+
CVE-2026-33807,2026-04-16T01:03:25Z,"@fastify/express's middleware path doubling causes authentication bypass in child plugin scopes",@fastify/express,0,4.0.5,,CRITICAL,CWE-436,
|
|
5489
|
+
CVE-2026-33808,2026-04-16T01:03:46Z,"@fastify/express has a middleware authentication bypass via URL normalization gaps (duplicate slashes and semicolons)",@fastify/express,0,4.0.5,,CRITICAL,CWE-436,
|
|
5455
5490
|
CVE-2026-33863,2026-03-26T18:50:33Z,"Convict has prototype pollution via load(), loadFile(), and schema initialization",convict,0,6.2.5,,CRITICAL,CWE-1321,
|
|
5456
5491
|
CVE-2026-33864,2026-03-26T18:55:41Z,"Convict has Prototype Pollution via startsWith() function",convict,0,6.2.5,,CRITICAL,CWE-1321,
|
|
5492
|
+
CVE-2026-33877,2026-04-16T20:42:11Z,"ApostropheCMS: User Enumeration via Timing Side Channel in Password Reset Endpoint",apostrophe,0,4.29.0,,LOW,CWE-208,
|
|
5493
|
+
CVE-2026-33888,2026-04-16T20:42:21Z,"ApostropheCMS: publicApiProjection Bypass via project Query Builder in Piece-Type REST API",apostrophe,0,4.29.0,,MODERATE,CWE-200;CWE-863,
|
|
5494
|
+
CVE-2026-33889,2026-04-16T20:42:37Z,"ApostropheCMS: Stored XSS via CSS Custom Property Injection in @apostrophecms/color-field Escaping Style Tag Context",apostrophe,0,4.29.0,,MODERATE,CWE-79,
|
|
5457
5495
|
CVE-2026-33891,2026-03-26T21:57:48Z,"Forge has Denial of Service via Infinite Loop in BigInteger.modInverse() with Zero Input",node-forge,0,1.4.0,,HIGH,CWE-835,
|
|
5458
5496
|
CVE-2026-33894,2026-03-26T22:02:35Z,"Forge has signature forgery in RSA-PKCS due to ASN.1 extra field ",node-forge,0,1.4.0,,HIGH,CWE-20;CWE-347,
|
|
5459
5497
|
CVE-2026-33895,2026-03-26T22:04:41Z,"Forge has signature forgery in Ed25519 due to missing S > L check",node-forge,0,1.4.0,,HIGH,CWE-347,
|
|
@@ -5478,7 +5516,14 @@ CVE-2026-34076,2026-03-27T19:58:19Z,"Clerk: SSRF in the opt-in clerkFrontendApiP
|
|
|
5478
5516
|
CVE-2026-34076,2026-03-27T19:58:19Z,"Clerk: SSRF in the opt-in clerkFrontendApiProxy feature may leak secret keys to unintended host",@clerk/fastify,3.1.0,3.1.5,,HIGH,CWE-918,
|
|
5479
5517
|
CVE-2026-34076,2026-03-27T19:58:19Z,"Clerk: SSRF in the opt-in clerkFrontendApiProxy feature may leak secret keys to unintended host",@clerk/hono,0.1.0,0.1.5,,HIGH,CWE-918,
|
|
5480
5518
|
CVE-2026-34083,2026-04-03T21:43:22Z,"Signal K Server: OAuth Authorization Code Theft via Unvalidated Host Header in OIDC Flow",signalk-server,2.20.0,2.24.0,,MODERATE,CWE-346;CWE-601,
|
|
5519
|
+
CVE-2026-34148,2026-04-07T18:04:09Z,"Fedify affected by resource exhaustion caused by unbounded redirect following during remote key/document resolution",@fedify/fedify,0,1.9.6,,HIGH,CWE-400;CWE-770,
|
|
5520
|
+
CVE-2026-34148,2026-04-07T18:04:09Z,"Fedify affected by resource exhaustion caused by unbounded redirect following during remote key/document resolution",@fedify/fedify,1.10.0,1.10.5,,HIGH,CWE-400;CWE-770,
|
|
5521
|
+
CVE-2026-34148,2026-04-07T18:04:09Z,"Fedify affected by resource exhaustion caused by unbounded redirect following during remote key/document resolution",@fedify/fedify,2.0.0,2.0.8,,HIGH,CWE-400;CWE-770,
|
|
5522
|
+
CVE-2026-34148,2026-04-07T18:04:09Z,"Fedify affected by resource exhaustion caused by unbounded redirect following during remote key/document resolution",@fedify/fedify,2.1.0,2.1.1,,HIGH,CWE-400;CWE-770,
|
|
5523
|
+
CVE-2026-34148,2026-04-07T18:04:09Z,"Fedify affected by resource exhaustion caused by unbounded redirect following during remote key/document resolution",@fedify/vocab-runtime,0,2.0.8,,HIGH,CWE-400;CWE-770,
|
|
5524
|
+
CVE-2026-34148,2026-04-07T18:04:09Z,"Fedify affected by resource exhaustion caused by unbounded redirect following during remote key/document resolution",@fedify/vocab-runtime,2.1.0,2.1.1,,HIGH,CWE-400;CWE-770,
|
|
5481
5525
|
CVE-2026-34156,2026-03-30T17:16:24Z,"NocoBase Affected by Sandbox Escape to RCE via console._stdout Prototype Chain Traversal in Workflow Script Node","@nocobase/plugin-workflow-javascript",0,2.0.28,,CRITICAL,CWE-913,
|
|
5526
|
+
CVE-2026-34166,2026-04-08T15:00:29Z,"LiquidJS Has Memory Limit Bypass via Quadratic Amplification in `replace` Filter",liquidjs,0,10.25.3,,LOW,CWE-400,
|
|
5482
5527
|
CVE-2026-3419,2026-03-05T21:29:54Z,"Fastify's Missing End Anchor in ""subtypeNameReg"" Allows Malformed Content-Types to Pass Validation",fastify,5.7.2,5.8.1,,MODERATE,CWE-185,
|
|
5483
5528
|
CVE-2026-34208,2026-04-03T21:44:39Z,"SandboxJS: Sandbox integrity escape ",@nyariv/sandboxjs,0,0.8.36,,CRITICAL,CWE-693;CWE-915,
|
|
5484
5529
|
CVE-2026-34209,2026-03-29T15:10:03Z,"mppx: Tempo has a session close voucher bypass vulnerability due to settled amount equality",mppx,0,0.4.11,,HIGH,CWE-294,
|
|
@@ -5498,11 +5543,18 @@ CVE-2026-34363,2026-03-30T17:40:59Z,"LiveQuery protected field leak via shared m
|
|
|
5498
5543
|
CVE-2026-34363,2026-03-30T17:40:59Z,"LiveQuery protected field leak via shared mutable state across concurrent subscribers",parse-server,9.0.0,9.7.0-alpha.9,,HIGH,CWE-362,
|
|
5499
5544
|
CVE-2026-34373,2026-03-30T18:05:47Z,"GraphQL API endpoint ignores CORS origin restriction",parse-server,3.5.0,8.6.66,,MODERATE,CWE-346,
|
|
5500
5545
|
CVE-2026-34373,2026-03-30T18:05:47Z,"GraphQL API endpoint ignores CORS origin restriction",parse-server,9.0.0,9.7.0-alpha.10,,MODERATE,CWE-346,
|
|
5501
|
-
CVE-2026-34404,2026-03-31T23:25:53Z,"Nuxt OG Image is vulnerable to Denial of Service via unbounded image dimensions",nuxt-og-image,0,6.2.5,,MODERATE,CWE-404,
|
|
5546
|
+
CVE-2026-34404,2026-03-31T23:25:53Z,"Nuxt OG Image is vulnerable to Denial of Service via unbounded image dimensions",nuxt-og-image,0,6.2.5,,MODERATE,CWE-400;CWE-404,
|
|
5502
5547
|
CVE-2026-34405,2026-03-31T23:27:03Z,"Nuxt OG Image is vulnerable to reflected XSS via query parameter injection into HTML attributes",nuxt-og-image,0,6.2.5,,MODERATE,CWE-79,
|
|
5548
|
+
CVE-2026-34425,2026-04-06T22:53:48Z,"OpenClaw's complex interpreter pipelines could skip exec script preflight validation",openclaw,0,2026.4.2,,MODERATE,CWE-184,
|
|
5549
|
+
CVE-2026-34426,2026-03-26T19:07:55Z,"OpenClaw: Windows media loaders accepted remote-host file URLs before local path validation",openclaw,0,2026.3.22,,MODERATE,CWE-40,
|
|
5503
5550
|
CVE-2026-34451,2026-04-01T21:16:49Z,"Claude SDK for TypeScript: Memory Tool Path Validation Allows Sandbox Escape to Sibling Directories",@anthropic-ai/sdk,0.79.0,0.81.0,,MODERATE,CWE-22;CWE-41,
|
|
5504
5551
|
CVE-2026-3449,2026-03-03T06:31:14Z,"@tootallnate/once vulnerable to Incorrect Control Flow Scoping",@tootallnate/once,0,3.0.1,,LOW,CWE-705,
|
|
5505
5552
|
CVE-2026-34503,2026-03-31T23:52:03Z,"OpenClaw's device removal and token revocation do not terminate active WebSocket sessions",openclaw,0,2026.3.28,,HIGH,CWE-613,
|
|
5553
|
+
CVE-2026-34504,2026-04-01T00:01:51Z,"OpenClaw affected by SSRF via unguarded image download in fal provider",openclaw,0,2026.3.28,,LOW,CWE-918,
|
|
5554
|
+
CVE-2026-34505,2026-03-13T20:55:38Z,"OpenClaw: Zalo webhook rate limiting could be bypassed before secret validation",openclaw,0,2026.3.12,,MODERATE,CWE-307,
|
|
5555
|
+
CVE-2026-34506,2026-03-12T14:21:35Z,"OpenClaw's MS Teams sender allowlist bypass when route allowlist is configured and sender allowlist is empty",openclaw,0,2026.3.8,,MODERATE,CWE-289,
|
|
5556
|
+
CVE-2026-34508,2026-03-31T12:31:36Z,"Duplicate Advisory: OpenClaw has Bypass in Webhook Rate Limiting via Pre-Authentication Secret Validation",openclaw,0,2026.3.12,,MODERATE,CWE-307,
|
|
5557
|
+
CVE-2026-34511,2026-04-04T06:26:55Z,"OpenClaw: Gemini OAuth exposed the PKCE verifier through the OAuth state parameter",openclaw,0,2026.4.2,,HIGH,CWE-345,
|
|
5506
5558
|
CVE-2026-34522,2026-04-01T21:36:40Z,"SillyTavern has a path traversal in `/api/chats/import` allows arbitrary file write outside intended chat directory",sillytavern,0,1.17.0,,HIGH,CWE-22;CWE-73,
|
|
5507
5559
|
CVE-2026-34523,2026-04-01T21:40:22Z,"SillyTavern: Path Traversal allows file existence oracle",sillytavern,0,1.17.0,,MODERATE,CWE-22,
|
|
5508
5560
|
CVE-2026-34524,2026-04-01T21:41:48Z,"SillyTavern: Path Traversal in `/api/chats/export` and `/api/chats/delete` allows arbitrary file read/delete within user data root",sillytavern,0,1.17.0,,HIGH,CWE-22,
|
|
@@ -5530,13 +5582,17 @@ CVE-2026-34750,2026-04-01T21:44:09Z,"Payload has Insufficient Filename Validatio
|
|
|
5530
5582
|
CVE-2026-34750,2026-04-01T21:44:09Z,"Payload has Insufficient Filename Validation in Client-Upload Signed-URL Endpoints",@payloadcms/storage-gcs,0,3.78.0,,MODERATE,CWE-22,
|
|
5531
5583
|
CVE-2026-34750,2026-04-01T21:44:09Z,"Payload has Insufficient Filename Validation in Client-Upload Signed-URL Endpoints",@payloadcms/storage-r2,0,3.78.0,,MODERATE,CWE-22,
|
|
5532
5584
|
CVE-2026-34750,2026-04-01T21:44:09Z,"Payload has Insufficient Filename Validation in Client-Upload Signed-URL Endpoints",@payloadcms/storage-s3,0,3.78.0,,MODERATE,CWE-22,
|
|
5533
|
-
CVE-2026-34751,2026-04-01T16:08:02Z,"Payload
|
|
5534
|
-
CVE-2026-34751,2026-04-01T16:08:02Z,"Payload
|
|
5585
|
+
CVE-2026-34751,2026-04-01T16:08:02Z,"Payload: Pre-Authentication Account Takeover via Parameter Injection in Password Recovery",@payloadcms/graphql,0,3.79.1,,CRITICAL,CWE-472;CWE-640,
|
|
5586
|
+
CVE-2026-34751,2026-04-01T16:08:02Z,"Payload: Pre-Authentication Account Takeover via Parameter Injection in Password Recovery",payload,0,3.79.1,,CRITICAL,CWE-472;CWE-640,
|
|
5535
5587
|
CVE-2026-34752,2026-04-01T22:56:09Z,"Haraka affected by DoS via `__proto__` email header",Haraka,0,3.1.4,,HIGH,CWE-248,
|
|
5536
5588
|
CVE-2026-34764,2026-04-03T21:52:33Z,"Electron: Use-after-free in offscreen shared texture release() callback",electron,33.0.0-alpha.1,39.8.5,,LOW,CWE-416,
|
|
5537
5589
|
CVE-2026-34764,2026-04-03T21:52:33Z,"Electron: Use-after-free in offscreen shared texture release() callback",electron,40.0.0-alpha.1,40.8.5,,LOW,CWE-416,
|
|
5538
5590
|
CVE-2026-34764,2026-04-03T21:52:33Z,"Electron: Use-after-free in offscreen shared texture release() callback",electron,41.0.0-alpha.1,41.1.0,,LOW,CWE-416,
|
|
5539
5591
|
CVE-2026-34764,2026-04-03T21:52:33Z,"Electron: Use-after-free in offscreen shared texture release() callback",electron,42.0.0-alpha.1,42.0.0-alpha.5,,LOW,CWE-416,
|
|
5592
|
+
CVE-2026-34765,2026-04-07T15:52:25Z,"Electron: Named window.open targets not scoped to the opener's browsing context",electron,0,39.8.5,,MODERATE,CWE-668,
|
|
5593
|
+
CVE-2026-34765,2026-04-07T15:52:25Z,"Electron: Named window.open targets not scoped to the opener's browsing context",electron,40.0.0-alpha.1,40.8.5,,MODERATE,CWE-668,
|
|
5594
|
+
CVE-2026-34765,2026-04-07T15:52:25Z,"Electron: Named window.open targets not scoped to the opener's browsing context",electron,41.0.0-alpha.1,41.1.0,,MODERATE,CWE-668,
|
|
5595
|
+
CVE-2026-34765,2026-04-07T15:52:25Z,"Electron: Named window.open targets not scoped to the opener's browsing context",electron,42.0.0-alpha.1,42.0.0-alpha.5,,MODERATE,CWE-668,
|
|
5540
5596
|
CVE-2026-34766,2026-04-03T02:36:52Z,"Electron: USB device selection not validated against filtered device list",electron,0,38.8.6,,LOW,CWE-862,
|
|
5541
5597
|
CVE-2026-34766,2026-04-03T02:36:52Z,"Electron: USB device selection not validated against filtered device list",electron,39.0.0-alpha.1,39.8.0,,LOW,CWE-862,
|
|
5542
5598
|
CVE-2026-34766,2026-04-03T02:36:52Z,"Electron: USB device selection not validated against filtered device list",electron,40.0.0-alpha.1,40.7.0,,LOW,CWE-862,
|
|
@@ -5595,14 +5651,20 @@ CVE-2026-34779,2026-04-03T02:46:16Z,"Electron: AppleScript injection in app.move
|
|
|
5595
5651
|
CVE-2026-34780,2026-04-03T02:46:56Z,"Electron: Context Isolation bypass via contextBridge VideoFrame transfer",electron,39.0.0-alpha.1,39.8.0,,HIGH,CWE-1188;CWE-668,
|
|
5596
5652
|
CVE-2026-34780,2026-04-03T02:46:56Z,"Electron: Context Isolation bypass via contextBridge VideoFrame transfer",electron,40.0.0-alpha.1,40.7.0,,HIGH,CWE-1188;CWE-668,
|
|
5597
5653
|
CVE-2026-34780,2026-04-03T02:46:56Z,"Electron: Context Isolation bypass via contextBridge VideoFrame transfer",electron,41.0.0-alpha.1,41.0.0-beta.8,,HIGH,CWE-1188;CWE-668,
|
|
5654
|
+
CVE-2026-34781,2026-04-07T15:52:28Z,"Electron: Crash in clipboard.readImage() on malformed clipboard image data",electron,0,39.8.5,,LOW,CWE-476,
|
|
5655
|
+
CVE-2026-34781,2026-04-07T15:52:28Z,"Electron: Crash in clipboard.readImage() on malformed clipboard image data",electron,40.0.0-alpha.1,40.8.5,,LOW,CWE-476,
|
|
5656
|
+
CVE-2026-34781,2026-04-07T15:52:28Z,"Electron: Crash in clipboard.readImage() on malformed clipboard image data",electron,41.0.0-alpha.1,41.1.0,,LOW,CWE-476,
|
|
5657
|
+
CVE-2026-34781,2026-04-07T15:52:28Z,"Electron: Crash in clipboard.readImage() on malformed clipboard image data",electron,42.0.0-alpha.1,42.0.0-alpha.5,,LOW,CWE-476,
|
|
5598
5658
|
CVE-2026-34784,2026-04-01T23:09:14Z,"Parser Server's streaming file download bypasses afterFind file trigger authorization",parse-server,0,8.6.71,,HIGH,CWE-285,
|
|
5599
5659
|
CVE-2026-34784,2026-04-01T23:09:14Z,"Parser Server's streaming file download bypasses afterFind file trigger authorization",parse-server,9.0.0,9.7.1-alpha.1,,HIGH,CWE-285,
|
|
5600
5660
|
CVE-2026-34825,2026-04-01T23:44:37Z,"NocoBase Has SQL Injection via template variable substitution in workflow SQL node","@nocobase/plugin-workflow-sql",0,2.0.30,,HIGH,CWE-89,
|
|
5601
5661
|
CVE-2026-3484,2026-03-03T21:31:16Z,"MCP NMAP Server has an Injection vulnerability",mcp-nmap-server,0,,1.0.1,MODERATE,CWE-74;CWE-77,
|
|
5602
5662
|
CVE-2026-34841,2026-04-02T18:34:04Z,"Axios npm Supply Chain Incident Impacting @usebruno/cli",@usebruno/cli,0,3.2.1,,CRITICAL,CWE-1395;CWE-494;CWE-506,
|
|
5603
|
-
CVE-2026-34950,2026-04-02T20:37:54Z,"fast-jwt: Incomplete fix for CVE-2023-48223: JWT Algorithm Confusion via Whitespace-Prefixed RSA Public Key",fast-jwt,0
|
|
5663
|
+
CVE-2026-34950,2026-04-02T20:37:54Z,"fast-jwt: Incomplete fix for CVE-2023-48223: JWT Algorithm Confusion via Whitespace-Prefixed RSA Public Key",fast-jwt,0,6.2.0,,CRITICAL,CWE-20;CWE-327,
|
|
5604
5664
|
CVE-2026-35038,2026-04-03T04:04:22Z,"Signal K Server: Arbitrary Prototype Read via `from` Field Bypass",signalk-server,0,2.24.0,,LOW,CWE-125;CWE-20;CWE-200,
|
|
5605
|
-
CVE-2026-35039,2026-04-03T04:07:09Z,"fast-jwt: Cache Confusion via cacheKeyBuilder Collisions Can Return Claims From a Different Token (Identity/Authorization Mixup)",fast-jwt,0.0.1,6.
|
|
5665
|
+
CVE-2026-35039,2026-04-03T04:07:09Z,"fast-jwt: Cache Confusion via cacheKeyBuilder Collisions Can Return Claims From a Different Token (Identity/Authorization Mixup)",fast-jwt,0.0.1,6.2.0,,CRITICAL,CWE-1289;CWE-345;CWE-706,
|
|
5666
|
+
CVE-2026-35040,2026-04-09T16:41:20Z,"fast-jwt: Stateful RegExp (/g or /y) causes non-deterministic allowed-claim validation (logical DoS)",fast-jwt,0,6.2.1,,MODERATE,CWE-440;CWE-697,
|
|
5667
|
+
CVE-2026-35041,2026-04-09T16:41:40Z,"fast-jwt has a ReDoS when using RegExp in allowed* leading to CPU exhaustion during token verification",fast-jwt,5.0.0,6.2.1,,MODERATE,CWE-1333,
|
|
5606
5668
|
CVE-2026-35042,2026-04-03T22:01:25Z,"fast-jwt accepts unknown `crit` header extensions (RFC 7515 violation)",fast-jwt,0,,6.1.0,HIGH,CWE-345;CWE-636,
|
|
5607
5669
|
CVE-2026-3520,2026-03-05T00:27:50Z,"Multer Vulnerable to Denial of Service via Uncontrolled Recursion",multer,0,2.1.1,,HIGH,CWE-674,
|
|
5608
5670
|
CVE-2026-35200,2026-04-04T04:22:11Z,"Parse Server: File upload Content-Type override via extension mismatch",parse-server,0,8.6.73,,LOW,CWE-436,
|
|
@@ -5620,11 +5682,126 @@ CVE-2026-35412,2026-04-04T06:11:18Z,"Directus: TUS Upload Authorization Bypass A
|
|
|
5620
5682
|
CVE-2026-35413,2026-04-04T06:10:27Z,"Directus: GraphQL Schema SDL Disclosure Setting",directus,0,11.16.1,,MODERATE,CWE-200,
|
|
5621
5683
|
CVE-2026-35441,2026-04-04T06:12:52Z,"Directus: GraphQL Alias Amplification Denial of Service Due to Missing Query Cost/Complexity Limits",directus,0,11.17.0,,MODERATE,CWE-400;CWE-770,
|
|
5622
5684
|
CVE-2026-35442,2026-04-04T06:13:57Z,"Directus: Authenticated Users Can Extract Concealed Fields via Aggregate Queries",directus,0,11.17.0,,HIGH,CWE-200;CWE-863,
|
|
5685
|
+
CVE-2026-35515,2026-04-06T17:59:51Z,"@nestjs/core Improperly Neutralizes Special Elements in Output Used by a Downstream Component ('Injection')",@nestjs/core,0,11.1.18,,MODERATE,CWE-74,
|
|
5686
|
+
CVE-2026-35525,2026-04-08T15:03:47Z,"LiquidJS: Root restriction bypass for partial and layout loading through symlinked templates",liquidjs,0,10.25.3,,HIGH,CWE-61,
|
|
5687
|
+
CVE-2026-35569,2026-04-16T20:44:18Z,"Stored XSS in SEO Fields Leads to Authenticated API Data Exposure in ApostropheCMS",apostrophe,0,4.29.0,,HIGH,CWE-116;CWE-79,
|
|
5688
|
+
CVE-2026-35603,2026-04-17T22:19:38Z,"Claude Code: Insecure System-Wide Configuration Loading Enables Local Privilege Escalation on Windows","@anthropic-ai/claude-code",0,2.1.75,,MODERATE,CWE-426,
|
|
5689
|
+
CVE-2026-35613,2026-04-08T00:06:03Z,"coursevault-preview has a path traversal due to improper base-directory boundary validation",coursevault-preview,0,0.1.1,,MODERATE,CWE-22,
|
|
5690
|
+
CVE-2026-35617,2026-03-29T15:48:15Z,"OpenClaw: Google Chat Authz Bypass via Group Policy Rebinding with Mutable Space displayName",openclaw,0,2026.3.28,,LOW,CWE-639;CWE-807;CWE-863,
|
|
5691
|
+
CVE-2026-35618,2026-03-26T18:56:32Z,"OpenClaw: Plivo V2 verified replay identity drifts on query-only variants",openclaw,0,2026.3.23,,HIGH,CWE-294,
|
|
5692
|
+
CVE-2026-35619,2026-03-30T18:41:15Z,"OpenClaw has a Gateway HTTP /v1/models Route Bypasses Operator Read Scope",openclaw,0,2026.3.24,,MODERATE,CWE-284;CWE-863,
|
|
5693
|
+
CVE-2026-35620,2026-03-30T19:06:22Z,"OpenClaw: Non-owner command-authorized sender can change the owner-only `/send` session delivery policy",openclaw,0,2026.3.24,,MODERATE,CWE-285;CWE-862,
|
|
5694
|
+
CVE-2026-35621,2026-03-30T18:52:38Z,"OpenClaw: Gateway operator.write Can Reach Admin-Class Channel Allowlist Persistence via chat.send",openclaw,0,2026.3.24,,HIGH,CWE-269,
|
|
5695
|
+
CVE-2026-35622,2026-03-26T21:37:36Z,"OpenClaw: Google Chat app-url webhook auth accepted non-deployment add-on principals",openclaw,0,2026.3.22,,MODERATE,CWE-290;CWE-863,
|
|
5696
|
+
CVE-2026-35623,2026-03-27T22:31:19Z,"OpenClaw: BlueBubbles Webhook Missing Rate Limiting Enables Brute-Force Password Guessing",openclaw,0,,2026.3.24,MODERATE,CWE-307;CWE-521,
|
|
5697
|
+
CVE-2026-35624,2026-03-26T21:34:18Z,"OpenClaw: Nextcloud Talk room allowlist matched colliding room names instead of stable room tokens",openclaw,0,2026.3.22,,LOW,CWE-639;CWE-807;CWE-863,
|
|
5698
|
+
CVE-2026-35626,2026-03-26T19:50:41Z,"OpenClaw is vulnerable to unauthenticated resource exhaustion through its voice call webhook handling",openclaw,0,2026.3.22,,MODERATE,CWE-400,
|
|
5699
|
+
CVE-2026-35627,2026-03-26T19:08:34Z,"OpenClaw: Nostr inbound DMs could trigger unauthenticated crypto work before sender policy enforcement",openclaw,0,2026.3.22,,HIGH,CWE-863,
|
|
5700
|
+
CVE-2026-35628,2026-03-27T22:37:35Z,"OpenClaw: Telegram Webhook Missing Guess Rate Limiting Enables Brute-Force Guessing of Weak Webhook Secret",openclaw,0,,2026.3.24,MODERATE,CWE-307;CWE-521,
|
|
5701
|
+
CVE-2026-35629,2026-03-29T15:48:42Z,"OpenClaw: SSRF via Unguarded Configured Base URLs in Multiple Channel Extensions (Incomplete Fix for CVE-2026-28476)",openclaw,0,2026.3.28,,HIGH,CWE-918,
|
|
5702
|
+
CVE-2026-35632,2026-03-26T21:49:25Z,"OpenClaw: Symlink Traversal via IDENTITY.md appendFile in agents.create/update (Incomplete Fix for CVE-2026-32013)",openclaw,0,,2026.2.22,MODERATE,CWE-61,
|
|
5703
|
+
CVE-2026-35633,2026-03-26T19:50:06Z,"OpenClaw: Remote media error responses could trigger unbounded memory allocation before failure",openclaw,0,2026.3.22,,HIGH,CWE-400;CWE-770,
|
|
5704
|
+
CVE-2026-35634,2026-03-26T18:59:00Z,"OpenClaw: Gateway Canvas local-direct requests bypass Canvas HTTP and WebSocket authentication",openclaw,0,2026.3.23,,MODERATE,CWE-287,
|
|
5705
|
+
CVE-2026-35635,2026-03-26T21:45:35Z,"OpenClaw Bypasses DM Policy Separation via Synology Chat Webhook Path Collision ",openclaw,0,2026.3.22,,MODERATE,CWE-285,
|
|
5706
|
+
CVE-2026-35637,2026-03-26T21:27:49Z,"OpenClaw: Tlon cite expansion happens before channel and DM authorization is complete",openclaw,0,2026.3.22,,MODERATE,CWE-863,
|
|
5707
|
+
CVE-2026-35639,2026-03-26T21:40:57Z,"OpenClaw Gateway: RCE and Privilege Escalation from operator.pairing to operator.admin via device.pair.approve",openclaw,0,2026.3.22,,CRITICAL,CWE-269,
|
|
5708
|
+
CVE-2026-35640,2026-03-29T15:48:58Z,"OpenClaw: Feishu webhook reads and parses unauthenticated request bodies before signature validation",openclaw,0,2026.3.28,,MODERATE,CWE-400,
|
|
5709
|
+
CVE-2026-35641,2026-03-30T18:52:09Z,"OpenClaw has an Arbitrary Malicious Code Execution Vulnerability",openclaw,0,2026.3.24,,HIGH,CWE-349;CWE-426,
|
|
5710
|
+
CVE-2026-35643,2026-03-26T19:30:52Z,"OpenClaw: Arbitrary code execution via unvalidated WebView JavascriptInterface",openclaw,0,2026.3.22,,HIGH,CWE-77;CWE-940,
|
|
5711
|
+
CVE-2026-35645,2026-03-29T15:49:34Z,"OpenClaw: Gateway Plugin Subagent Fallback `deleteSession` Uses Synthetic `operator.admin`",openclaw,0,2026.3.28,,MODERATE,CWE-266;CWE-648;CWE-863,
|
|
5712
|
+
CVE-2026-35646,2026-03-29T15:50:09Z,"OpenClaw: Synology Chat Webhook Pre-Auth Rate-Limit Bypass Enables Brute-Force Guessing of Webhook Token",openclaw,0,2026.3.28,,MODERATE,CWE-307;CWE-521,
|
|
5713
|
+
CVE-2026-35647,2026-03-27T22:31:48Z,"OpenClaw: Matrix Verification Notices Bypass Matrix DM Policy and Reply to Unpaired DM Peers",openclaw,0,,2026.3.24,MODERATE,CWE-288;CWE-863,
|
|
5714
|
+
CVE-2026-35648,2026-03-26T21:14:24Z,"OpenClaw may have stale policy enforcement for queued node actions",openclaw,0,2026.3.22,,LOW,CWE-367;CWE-863,
|
|
5715
|
+
CVE-2026-35649,2026-03-26T21:30:54Z,"OpenClaw: Tlon settings empty-allowlist reconciliation bypassed intended revocation",openclaw,0,2026.3.22,,LOW,CWE-285;CWE-863,
|
|
5716
|
+
CVE-2026-35650,2026-03-26T19:51:12Z,"OpenClaw has Inconsistent Host Exec Environment Override Sanitization",openclaw,0,2026.3.22,,HIGH,CWE-15;CWE-693,
|
|
5717
|
+
CVE-2026-35651,2026-03-29T15:50:41Z,"OpenClaw has ACP CLI approval prompt ANSI escape sequence injection",openclaw,2026.2.13,2026.3.28,,MODERATE,CWE-116;CWE-150,
|
|
5718
|
+
CVE-2026-35652,2026-03-26T21:23:04Z,"OpenClaw: Mattermost callback dispatch allowed non-allowlisted sender actions",openclaw,0,2026.3.22,,MODERATE,CWE-285;CWE-696;CWE-863,
|
|
5719
|
+
CVE-2026-35653,2026-03-30T19:05:11Z,"OpenClaw: `browser.request` still allows `POST /reset-profile` through the `operator.write` surface",openclaw,0,2026.3.24,,HIGH,CWE-863,
|
|
5720
|
+
CVE-2026-35654,2026-03-29T15:49:50Z,"OpenClaw: MS Teams Feedback Invocation Bypasses Sender Allowlists and Records Unauthorized Session Feedback",openclaw,0,2026.3.28,,MODERATE,CWE-288;CWE-863,
|
|
5721
|
+
CVE-2026-35655,2026-03-26T21:46:42Z,"OpenClaw's Conflicting Tool Identity Hints Bypass Dangerous-Tool Prompting",openclaw,0,2026.3.22,,MODERATE,CWE-807;CWE-863,
|
|
5722
|
+
CVE-2026-35656,2026-03-26T21:42:30Z,"OpenClaw: Forwarding header spoofing bypasses gateway.trustedProxies origin detection",openclaw,0,2026.3.22,,MODERATE,CWE-290,
|
|
5723
|
+
CVE-2026-35657,2026-03-29T15:46:40Z,"OpenClaw: Gateway HTTP Session History Route Bypasses Operator Read Scope",openclaw,0,2026.3.25,,MODERATE,CWE-639;CWE-863,
|
|
5724
|
+
CVE-2026-35658,2026-03-26T21:48:06Z,"OpenClaw: Image Tool `tools.fs.workspaceOnly` Bypass via Sandbox Bridge Mounts",openclaw,0,2026.3.2,,MODERATE,CWE-668;CWE-863,
|
|
5725
|
+
CVE-2026-35659,2026-03-26T19:50:24Z,"OpenClaw: Bonjour/DNS-SD TXT metadata steers CLI routing after failed service resolution",openclaw,0,2026.3.22,,MODERATE,CWE-345;CWE-642,
|
|
5726
|
+
CVE-2026-35660,2026-03-26T19:00:45Z,"OpenClaw: Gateway agent /reset exposes admin session reset to operator.write callers",openclaw,0,2026.3.23,,HIGH,CWE-862,
|
|
5727
|
+
CVE-2026-35661,2026-03-29T15:50:23Z,"OpenClaw: Telegram DM-Scoped Inline Button Callbacks Bypass DM Pairing and Mutate Session State",openclaw,0,2026.3.28,,MODERATE,CWE-285;CWE-288;CWE-863,
|
|
5728
|
+
CVE-2026-35662,2026-03-26T21:44:41Z,"OpenClaw leaf subagents can bypass controlScope restrictions to send messages to child sessions",openclaw,0,2026.3.22,,MODERATE,CWE-285;CWE-862,
|
|
5729
|
+
CVE-2026-35663,2026-03-27T22:29:12Z,"OpenClaw: Gateway Backend Reconnect lets Non-Admin Operator Scopes Self-Claim operator.admin",openclaw,0,,2026.3.24,CRITICAL,CWE-269;CWE-863,
|
|
5730
|
+
CVE-2026-35664,2026-03-29T15:49:17Z,"OpenClaw: Feishu Raw Card Send Surface Can Mint Legacy Card Callbacks That Bypass DM Pairing",openclaw,0,2026.3.28,,MODERATE,CWE-288;CWE-863,
|
|
5731
|
+
CVE-2026-35665,2026-03-30T18:32:03Z,"OpenClaw has incomplete Fix for CVE-2026-32011: Feishu Webhook Pre-Auth Body Parsing DoS (Slow-Body / Slowloris Variant)",openclaw,0,2026.3.24,,MODERATE,CWE-400;CWE-405,
|
|
5732
|
+
CVE-2026-35666,2026-03-26T19:08:45Z,"OpenClaw's system.run allowlist can be bypassed through an unregistered time dispatch wrapper",openclaw,0,2026.3.22,,HIGH,CWE-706;CWE-863,
|
|
5733
|
+
CVE-2026-35667,2026-03-30T18:30:01Z,"OpenClaw has incomplete Fix for CVE-2026-27486: Unvalidated SIGKILL in `!stop` Chat Command via `shell-utils.ts`",openclaw,0,2026.3.24,,MODERATE,CWE-404,
|
|
5734
|
+
CVE-2026-35668,2026-03-30T18:31:02Z,"OpenClaw has Sandbox Media Root Bypass via Unnormalized `mediaUrl` / `fileUrl` Parameter Keys (CWE-22)",openclaw,0,2026.3.24,,HIGH,CWE-22,
|
|
5735
|
+
CVE-2026-35669,2026-03-27T22:30:57Z,"OpenClaw: Gateway Plugin HTTP Auth Grants Unrestricted operator.admin Runtime Scope to All Callers",openclaw,0,,2026.3.24,HIGH,CWE-266;CWE-863,
|
|
5736
|
+
CVE-2026-35670,2026-03-26T19:08:16Z,"OpenClaw: Synology Chat reply delivery could be rebound through username-based user resolution.",openclaw,0,2026.3.22,,MODERATE,CWE-639;CWE-706;CWE-807,
|
|
5623
5737
|
CVE-2026-3635,2026-03-25T19:32:28Z,"fastify: request.protocol and request.host Spoofable via X-Forwarded-Proto/Host from Untrusted Connections",fastify,0,5.8.3,,MODERATE,CWE-348,
|
|
5738
|
+
CVE-2026-39313,2026-04-16T20:44:32Z,"MCP-Framework: Unbounded memory allocation in readRequestBody allows denial of service via HTTP transport",mcp-framework,0,0.2.22,,HIGH,CWE-770,
|
|
5739
|
+
CVE-2026-39315,2026-04-09T20:28:05Z,"Unhead has a hasDangerousProtocol() bypass via leading-zero padded HTML entities in useHeadSafe()",unhead,0,2.1.13,,MODERATE,CWE-184,
|
|
5740
|
+
CVE-2026-39321,2026-04-08T00:07:10Z,"Parse Server has a login timing side-channel reveals user existence",parse-server,0,8.6.74,,MODERATE,CWE-208,
|
|
5741
|
+
CVE-2026-39321,2026-04-08T00:07:10Z,"Parse Server has a login timing side-channel reveals user existence",parse-server,9.0.0,9.8.0-alpha.6,,MODERATE,CWE-208,
|
|
5742
|
+
CVE-2026-39356,2026-04-08T00:14:58Z,"Drizzle ORM has SQL injection via improperly escaped SQL identifiers",drizzle-orm,0,0.45.2,,HIGH,CWE-89,
|
|
5743
|
+
CVE-2026-39356,2026-04-08T00:14:58Z,"Drizzle ORM has SQL injection via improperly escaped SQL identifiers",drizzle-orm,1.0.0-beta.2,1.0.0-beta.20,,HIGH,CWE-89,
|
|
5744
|
+
CVE-2026-39363,2026-04-06T18:03:24Z,"Vite Vulnerable to Arbitrary File Read via Vite Dev Server WebSocket",vite,6.0.0,6.4.2,,HIGH,CWE-200;CWE-306,
|
|
5745
|
+
CVE-2026-39363,2026-04-06T18:03:24Z,"Vite Vulnerable to Arbitrary File Read via Vite Dev Server WebSocket",vite,7.0.0,7.3.2,,HIGH,CWE-200;CWE-306,
|
|
5746
|
+
CVE-2026-39363,2026-04-06T18:03:24Z,"Vite Vulnerable to Arbitrary File Read via Vite Dev Server WebSocket",vite,8.0.0,8.0.5,,HIGH,CWE-200;CWE-306,
|
|
5747
|
+
CVE-2026-39364,2026-04-06T18:03:32Z,"Vite: `server.fs.deny` bypassed with queries",vite,7.1.0,7.3.2,,HIGH,CWE-180;CWE-284,
|
|
5748
|
+
CVE-2026-39364,2026-04-06T18:03:32Z,"Vite: `server.fs.deny` bypassed with queries",vite,8.0.0,8.0.5,,HIGH,CWE-180;CWE-284,
|
|
5749
|
+
CVE-2026-39365,2026-04-06T18:03:46Z,"Vite Vulnerable to Path Traversal in Optimized Deps `.map` Handling",vite,0,6.4.2,,MODERATE,CWE-200;CWE-22,
|
|
5750
|
+
CVE-2026-39365,2026-04-06T18:03:46Z,"Vite Vulnerable to Path Traversal in Optimized Deps `.map` Handling",vite,7.0.0,7.3.2,,MODERATE,CWE-200;CWE-22,
|
|
5751
|
+
CVE-2026-39365,2026-04-06T18:03:46Z,"Vite Vulnerable to Path Traversal in Optimized Deps `.map` Handling",vite,8.0.0,8.0.5,,MODERATE,CWE-200;CWE-22,
|
|
5752
|
+
CVE-2026-39371,2026-04-08T00:12:06Z,"RedwoodSDK has a CSRF vulnerability in server function dispatch via GET requests",rwsdk,1.0.0-beta.50,1.0.6,,HIGH,CWE-352,
|
|
5753
|
+
CVE-2026-39381,2026-04-08T00:14:50Z,"Parse Server's Endpoint `/sessions/me` bypasses `_Session` `protectedFields`",parse-server,7.0.0,8.6.75,,MODERATE,CWE-863,
|
|
5754
|
+
CVE-2026-39381,2026-04-08T00:14:50Z,"Parse Server's Endpoint `/sessions/me` bypasses `_Session` `protectedFields`",parse-server,9.0.0,9.8.0-alpha.7,,MODERATE,CWE-863,
|
|
5755
|
+
CVE-2026-39397,2026-04-08T00:15:54Z,"@delmaredigital/payload-puc is missing authorization on /api/puck/* CRUD endpoints allows unauthenticated access to Puck-registered collections","@delmaredigital/payload-puck",0,0.6.23,,CRITICAL,CWE-862,
|
|
5756
|
+
CVE-2026-39398,2026-04-08T00:16:09Z,"openclaw-claude-bridge: sandbox is not effective - `--allowed-tools """"` does not restrict available tools",openclaw-claude-bridge,0,2.0.0,,MODERATE,CWE-1188;CWE-276,
|
|
5757
|
+
CVE-2026-39406,2026-04-08T00:16:39Z,"@hono/node-server: Middleware bypass via repeated slashes in serveStatic",@hono/node-server,0,1.19.13,,MODERATE,CWE-22,
|
|
5758
|
+
CVE-2026-39407,2026-04-08T00:16:45Z,"Hono: Middleware bypass via repeated slashes in serveStatic",hono,0,4.12.12,,MODERATE,CWE-22,
|
|
5759
|
+
CVE-2026-39408,2026-04-08T00:16:51Z,"Hono: Path traversal in toSSG() allows writing files outside the output directory",hono,4.0.0,4.12.12,,MODERATE,CWE-22,
|
|
5760
|
+
CVE-2026-39409,2026-04-08T00:17:14Z,"Hono has incorrect IP matching in ipRestriction() for IPv4-mapped IPv6 addresses",hono,0,4.12.12,,MODERATE,CWE-180,
|
|
5761
|
+
CVE-2026-39410,2026-04-08T00:17:21Z,"Hono: Non-breaking space prefix bypass in cookie name handling in getCookie()",hono,0,4.12.12,,MODERATE,CWE-20,
|
|
5762
|
+
CVE-2026-39411,2026-04-08T15:04:30Z,"LobeHub: Unauthenticated authentication bypass on `webapi` routes via forgeable `X-lobe-chat-auth` header",@lobehub/lobehub,0,2.1.48,,MODERATE,CWE-287;CWE-290;CWE-345,
|
|
5763
|
+
CVE-2026-39412,2026-04-08T15:04:39Z,"LiquidJS: ownPropertyOnly bypass via sort_natural filter — prototype property information disclosure through sorting side-channel",liquidjs,0,10.25.4,,MODERATE,CWE-200,
|
|
5624
5764
|
CVE-2026-3965,2026-03-12T00:31:17Z,"@whyour/qinglong: manipulation of the argument command leads to protection mechanism failure",@whyour/qinglong,0,2.20.2,,LOW,CWE-693,
|
|
5765
|
+
CVE-2026-39857,2026-04-16T20:45:15Z,"ApostropheCMS: Information Disclosure via choices/counts Query Parameters Bypassing publicApiProjection Field Restrictions",apostrophe,0,4.29.0,,MODERATE,CWE-200,
|
|
5766
|
+
CVE-2026-39859,2026-04-08T15:04:44Z,"LiquidJS: `renderFile()` / `parseFile()` bypass configured `root` and allow arbitrary file read",liquidjs,0,10.25.5,,MODERATE,CWE-22,
|
|
5767
|
+
CVE-2026-39865,2026-04-08T15:51:48Z,"Axios HTTP/2 Session Cleanup State Corruption Vulnerability",axios,1.13.0,1.13.2,,MODERATE,CWE-400,
|
|
5768
|
+
CVE-2026-39884,2026-04-14T22:32:15Z,"MCP Server Kubernetes has an Argument Injection in port_forward tool via space-splitting",mcp-server-kubernetes,0,3.5.0,,HIGH,CWE-88,
|
|
5769
|
+
CVE-2026-39885,2026-04-08T19:22:53Z,"mcp-from-openapi is Vulnerable to SSRF via $ref Dereferencing in Untrusted OpenAPI Specifications",@frontmcp/adapters,0,1.0.4,,HIGH,CWE-918,
|
|
5770
|
+
CVE-2026-39885,2026-04-08T19:22:53Z,"mcp-from-openapi is Vulnerable to SSRF via $ref Dereferencing in Untrusted OpenAPI Specifications",@frontmcp/sdk,0,1.0.4,,HIGH,CWE-918,
|
|
5771
|
+
CVE-2026-39885,2026-04-08T19:22:53Z,"mcp-from-openapi is Vulnerable to SSRF via $ref Dereferencing in Untrusted OpenAPI Specifications",mcp-from-openapi,0,2.3.0,,HIGH,CWE-918,
|
|
5772
|
+
CVE-2026-39942,2026-04-04T06:06:39Z,"Directus: Path Traversal and Broken Access Control in File Management API",directus,0,11.17.0,,HIGH,CWE-284;CWE-639;CWE-915,
|
|
5773
|
+
CVE-2026-39943,2026-04-04T06:12:07Z,"Directus: Sensitive fields exposed in revision history",directus,0,11.17.0,,MODERATE,CWE-200;CWE-312,
|
|
5774
|
+
CVE-2026-39974,2026-04-08T19:53:48Z,"n8n-mcp has authenticated SSRF via instance-URL header in multi-tenant HTTP mode",n8n-mcp,0,2.47.4,,HIGH,CWE-918,
|
|
5775
|
+
CVE-2026-39983,2026-04-08T20:02:25Z,"basic-ftp has FTP Command Injection via CRLF",basic-ftp,5.2.0,5.2.1,,HIGH,CWE-93,
|
|
5776
|
+
CVE-2026-40037,2026-04-09T17:37:08Z,"OpenClaw: `fetchWithSsrFGuard` replays unsafe request bodies across cross-origin redirects",openclaw,0,2026.4.8,,HIGH,CWE-345,
|
|
5777
|
+
CVE-2026-40073,2026-04-10T17:24:31Z,"@sveltejs/adapter-node has a BODY_SIZE_LIMIT bypass",@sveltejs/kit,0,2.57.1,,HIGH,CWE-770,
|
|
5778
|
+
CVE-2026-40074,2026-04-10T17:32:00Z,"@sveltejs/kit: Unvalidated redirect in handle hook causes Denial-of-Service",@sveltejs/kit,0,2.57.1,,MODERATE,CWE-755,
|
|
5779
|
+
CVE-2026-40163,2026-04-10T19:30:27Z,"Saltcorn has an Unauthenticated Path Traversal in sync endpoints, allowing arbitrary file write and directory read",@saltcorn/server,0,1.4.5,,HIGH,CWE-22,
|
|
5780
|
+
CVE-2026-40163,2026-04-10T19:30:27Z,"Saltcorn has an Unauthenticated Path Traversal in sync endpoints, allowing arbitrary file write and directory read",@saltcorn/server,1.5.0-beta.0,1.5.5,,HIGH,CWE-22,
|
|
5781
|
+
CVE-2026-40163,2026-04-10T19:30:27Z,"Saltcorn has an Unauthenticated Path Traversal in sync endpoints, allowing arbitrary file write and directory read",@saltcorn/server,1.6.0-alpha.0,1.6.0-beta.4,,HIGH,CWE-22,
|
|
5782
|
+
CVE-2026-40175,2026-04-10T19:47:16Z,"Axios has Unrestricted Cloud Metadata Exfiltration via Header Injection Chain",axios,0,0.31.0,,MODERATE,CWE-113;CWE-444;CWE-918,
|
|
5783
|
+
CVE-2026-40175,2026-04-10T19:47:16Z,"Axios has Unrestricted Cloud Metadata Exfiltration via Header Injection Chain",axios,1.0.0,1.15.0,,MODERATE,CWE-113;CWE-444;CWE-918,
|
|
5784
|
+
CVE-2026-40186,2026-04-16T21:08:29Z,"sanitize-html allowedTags Bypass via Entity-Decoded Text in nonTextTags Elements",sanitize-html,2.17.2,2.17.3,,MODERATE,CWE-79,
|
|
5785
|
+
CVE-2026-40190,2026-04-10T20:18:02Z,"LangSmith Client SDKs has Prototype Pollution in langsmith-sdk via Incomplete `__proto__` Guard in Internal lodash `set()`",langsmith,0,0.5.18,,MODERATE,CWE-1321,
|
|
5786
|
+
CVE-2026-40255,2026-04-14T20:01:28Z,"@adonisjs/http-server has an Open Redirect vulnerability",@adonisjs/core,0,,7.3.1,MODERATE,CWE-601,
|
|
5787
|
+
CVE-2026-40255,2026-04-14T20:01:28Z,"@adonisjs/http-server has an Open Redirect vulnerability",@adonisjs/http-server,0,7.8.1,,MODERATE,CWE-601,
|
|
5788
|
+
CVE-2026-40255,2026-04-14T20:01:28Z,"@adonisjs/http-server has an Open Redirect vulnerability",@adonisjs/http-server,8.0.0-next.0,8.2.0,,MODERATE,CWE-601,
|
|
5789
|
+
CVE-2026-40299,2026-04-10T21:03:55Z,"next-intl has an open redirect vulnerability",next-intl,0,4.9.1,,MODERATE,CWE-601,
|
|
5790
|
+
CVE-2026-40346,2026-04-15T19:43:50Z,"NocoBase has SSRF in Workflow HTTP Request and Custom Request Plugins","@nocobase/plugin-workflow-request",0,2.0.37,,MODERATE,CWE-918,
|
|
5625
5791
|
CVE-2026-4039,2026-02-27T21:36:17Z,"OpenClaw: Skill env override host env injection via applySkillConfigEnvOverrides (defense-in-depth)",openclaw,0,2026.2.21,,MODERATE,CWE-1341;CWE-15;CWE-94,
|
|
5626
5792
|
CVE-2026-4040,2026-02-19T22:06:26Z,"OpenClaw safeBins file-existence oracle information disclosure",openclaw,0,2026.2.19,,MODERATE,CWE-203,
|
|
5793
|
+
CVE-2026-40879,2026-04-14T00:15:09Z,"Nest Affected by DoS via Recursive handleData in JsonSocket (TCP Transport)",@nestjs/microservices,0,11.1.19,,HIGH,CWE-770,
|
|
5794
|
+
CVE-2026-40887,2026-04-14T22:38:01Z,"@vendure/core has a SQL Injection vulnerability",@vendure/core,1.7.4,2.3.4,,CRITICAL,CWE-89,
|
|
5795
|
+
CVE-2026-40887,2026-04-14T22:38:01Z,"@vendure/core has a SQL Injection vulnerability",@vendure/core,3.0.0,3.5.7,,CRITICAL,CWE-89,
|
|
5796
|
+
CVE-2026-40887,2026-04-14T22:38:01Z,"@vendure/core has a SQL Injection vulnerability",@vendure/core,3.6.0,3.6.2,,CRITICAL,CWE-89,
|
|
5797
|
+
CVE-2026-40897,2026-04-16T22:38:43Z,"Unsafe object property setter in mathjs",mathjs,13.1.1,15.2.0,,HIGH,CWE-915,
|
|
5627
5798
|
CVE-2026-4092,2026-03-13T20:57:29Z,"@google/clasp vulnerable to unsafe path traversal cloning or pulling a malicious script",@google/clasp,0,3.2.0,,HIGH,CWE-22,
|
|
5799
|
+
CVE-2026-40931,2026-04-17T21:32:59Z,"Complete Bypass of CVE-2026-24884 Patch via Git-Delivered Symlink Poisoning in compressing",compressing,0,1.10.5,,HIGH,CWE-59,
|
|
5800
|
+
CVE-2026-40931,2026-04-17T21:32:59Z,"Complete Bypass of CVE-2026-24884 Patch via Git-Delivered Symlink Poisoning in compressing",compressing,2.0.0,2.1.1,,HIGH,CWE-59,
|
|
5801
|
+
CVE-2026-40933,2026-04-16T21:18:17Z,"Flowise: Authenticated RCE Via MCP Adapters",flowise,0,3.1.0,,CRITICAL,CWE-78,
|
|
5802
|
+
CVE-2026-40933,2026-04-16T21:18:17Z,"Flowise: Authenticated RCE Via MCP Adapters",flowise-components,0,3.1.0,,CRITICAL,CWE-78,
|
|
5803
|
+
CVE-2026-41242,2026-04-16T22:34:57Z,"Arbitrary code execution in protobufjs",protobufjs,0,7.5.5,,CRITICAL,CWE-94,
|
|
5804
|
+
CVE-2026-41242,2026-04-16T22:34:57Z,"Arbitrary code execution in protobufjs",protobufjs,8.0.0,8.0.1,,CRITICAL,CWE-94,
|
|
5628
5805
|
CVE-2026-4258,2026-03-17T06:31:32Z,"sjcl is missing point-on-curve validation in sjcl.ecc.basicKey.publicKey",sjcl,0,1.0.9,,HIGH,CWE-325;CWE-347,
|
|
5629
5806
|
CVE-2026-4598,2026-03-23T06:30:29Z,"jsrsasign is vulnerable to DoS through Infinite Loop when processing zero or negative inputs",jsrsasign,0,11.1.1,,HIGH,CWE-835,
|
|
5630
5807
|
CVE-2026-4599,2026-03-23T06:30:29Z,"jsrsasign: Incomplete Comparison Allows DSA Private Key Recovery via Biased Nonce Generation",jsrsasign,7.0.0,11.1.1,,CRITICAL,CWE-1023,
|
|
@@ -5641,6 +5818,19 @@ CVE-2026-4923,2026-03-27T22:23:52Z,"path-to-regexp vulnerable to Regular Express
|
|
|
5641
5818
|
CVE-2026-4926,2026-03-27T22:23:27Z,"path-to-regexp vulnerable to Denial of Service via sequential optional groups",path-to-regexp,8.0.0,8.4.0,,HIGH,CWE-1333;CWE-400,
|
|
5642
5819
|
CVE-2026-5323,2026-04-02T09:30:24Z,"a11y-mcp: Server-Side Request Forgery (SSRF) vulnerability in A11yServer function",a11y-mcp,0,1.0.5,,LOW,CWE-918,
|
|
5643
5820
|
CVE-2026-5327,2026-04-02T12:31:05Z,"fast-filesystem-mcp is vulnerable to command injection through handleGetDiskUsage function",fast-filesystem-mcp,0,,3.5.0,LOW,CWE-74,
|
|
5821
|
+
CVE-2026-5602,2026-04-06T00:30:24Z,"@nor2/heim-mcp vulnerable to command injection",@nor2/heim-mcp,0,,0.1.3,LOW,CWE-77,
|
|
5822
|
+
CVE-2026-5603,2026-04-06T00:30:24Z,"@elgentos/magento2-dev-mcp vulnerable to command injection","@elgentos/magento2-dev-mcp",0,,1.0.2,LOW,CWE-77,
|
|
5823
|
+
CVE-2026-5758,2026-04-15T18:31:58Z,"Mafintosh's protocol-buffers-schema is vulnerable to prototype pollution",protocol-buffers-schema,0,3.6.1,,MODERATE,CWE-1321,
|
|
5824
|
+
CVE-2026-5831,2026-04-09T03:31:14Z,"Agions taskflow-ai vulnerable to os command injection in src/mcp/server/handlers.ts",taskflow-ai,0,2.1.9,,MODERATE,CWE-77,
|
|
5825
|
+
CVE-2026-5832,2026-04-09T03:31:15Z,"api-lab-mcp vulnerable to SSRF",api-lab-mcp,0,,0.2.1,MODERATE,CWE-918,
|
|
5826
|
+
CVE-2026-5833,2026-04-09T06:30:27Z,"awwaiid mcp-server-taskwarrior vulnerable to command injection",mcp-server-taskwarrior,0,,1.0.1,LOW,CWE-74,
|
|
5827
|
+
CVE-2026-5842,2026-04-09T06:30:28Z,"decolua 9router vulnerable to authorization bypass",9router,0,0.3.75,,MODERATE,CWE-285,
|
|
5828
|
+
CVE-2026-5986,2026-04-10T00:30:31Z,"Zod jsVideoUrlParser vulnerable to ReDoS in util.js",js-video-url-parser,0,,0.5.1,MODERATE,CWE-400,
|
|
5829
|
+
CVE-2026-6011,2026-04-10T06:31:38Z,"OpenClaw vulnerable to SSRF in src/agents/tools/web-fetch.ts",openclaw,0,2026.1.29,,LOW,CWE-918,
|
|
5830
|
+
CVE-2026-6216,2026-04-13T21:30:45Z,"DbGate has cross site scripting via the SVG Icon String Handler component",dbgate-web,0,7.1.5,,LOW,CWE-79,
|
|
5831
|
+
CVE-2026-6270,2026-04-16T22:29:04Z,"@fastify/middie vulnerable to middleware authentication bypass in child plugin scopes",@fastify/middie,0,9.3.2,,CRITICAL,CWE-436,
|
|
5832
|
+
CVE-2026-6410,2026-04-16T22:34:30Z,"@fastify/static vulnerable to path traversal in directory listing",@fastify/static,8.0.0,9.1.1,,MODERATE,CWE-22,
|
|
5833
|
+
CVE-2026-6414,2026-04-16T22:34:03Z,"@fastify/static vulnerable to route guard bypass via encoded path separators",@fastify/static,8.0.0,9.1.1,,MODERATE,CWE-177,
|
|
5644
5834
|
GHSA-224h-p7p5-rh85,2020-09-01T17:32:26Z,"Directory Traversal in wenluhong1",wenluhong1,0.0.0,,,HIGH,CWE-22,
|
|
5645
5835
|
GHSA-224p-v68g-5g8f,2025-08-26T18:45:55Z,"GraphQL Armor Max-Depth Plugin Bypass via fragment caching","@escape.tech/graphql-armor-max-depth",0,2.4.2,,MODERATE,CWE-400,
|
|
5646
5836
|
GHSA-226w-6hhj-69hp,2020-09-03T19:06:52Z,"Malicious Package in cal_rd",cal_rd,0.0.0,,,CRITICAL,CWE-506,
|
|
@@ -5658,12 +5848,19 @@ GHSA-24v3-254g-jv85,2025-12-19T21:32:35Z,"Tuta Mail has DOM attribute and CSS in
|
|
|
5658
5848
|
GHSA-255r-pghp-r5wh,2020-09-03T17:05:34Z,"Malicious Package in hdeky",hdeky,0.0.0,,,CRITICAL,CWE-506,
|
|
5659
5849
|
GHSA-2563-83p7-f34p,2020-09-02T20:24:41Z,"Malicious Package in requestt",requestt,0,,,CRITICAL,CWE-506,
|
|
5660
5850
|
GHSA-25v4-mcx4-hh35,2020-09-04T17:28:28Z,"Cross-Site Scripting in atlasboard-atlassian-package","atlasboard-atlassian-package",0.0.0,,,HIGH,CWE-79,
|
|
5851
|
+
GHSA-25wv-8phj-8p7r,2026-04-09T17:35:57Z,"OpenClaw: Concurrent async auth attempts can bypass the intended shared-secret rate-limit budget on Tailscale-capable paths",openclaw,0,2026.4.4,,LOW,CWE-400,
|
|
5852
|
+
GHSA-265w-rf2w-cjh4,2026-04-16T22:45:26Z,"Paperclip: Privilege Escalation via Agent-Controlled workspaceStrategy.provisionCommand Leading to OS Command Execution",@paperclipai/server,0,2026.416.0,,HIGH,CWE-78,
|
|
5661
5853
|
GHSA-26hg-crh6-mjrw,2021-02-23T21:28:28Z,"Directory Traversal",list-n-stream,0,0.0.11,,HIGH,,
|
|
5854
|
+
GHSA-26pp-8wgv-hjvm,2026-04-08T00:17:02Z,"Hono missing validation of cookie name on write path in setCookie()",hono,0,4.12.12,,MODERATE,CWE-113,
|
|
5855
|
+
GHSA-26wg-9xf2-q495,2026-04-14T23:23:01Z,"Novu has a XSS sanitization bypass",novu/api,0,3.15.0,,HIGH,CWE-79,
|
|
5856
|
+
GHSA-2767-2q9v-9326,2026-04-17T21:57:31Z,"OpenClaw: QQBot reply media URL handling could trigger SSRF and re-upload fetched bytes",openclaw,0,2026.4.12,,MODERATE,CWE-918,
|
|
5662
5857
|
GHSA-277h-px4m-62q8,2024-10-03T19:46:12Z,"@saltcorn/server arbitrary file zip read and download when downloading auto backups",@saltcorn/server,0,1.0.0-beta.14,,MODERATE,CWE-22,
|
|
5663
5858
|
GHSA-277p-xwpp-3jf7,2020-09-02T15:49:22Z,"Malicious Package in rrgod",rrgod,0.0.0,,,CRITICAL,CWE-506,
|
|
5664
5859
|
GHSA-27v7-qhfv-rqq8,2019-05-30T17:26:30Z,"Insecure Credential Storage in web3",web3,0,,1.5.2,LOW,,
|
|
5665
5860
|
GHSA-2858-xg23-26fp,2026-03-03T21:18:56Z,"OpenClaw: Node camera URL payload host-binding bypass allowed gateway fetch pivots",openclaw,2026.2.13,2026.3.2,,MODERATE,CWE-918,
|
|
5666
5861
|
GHSA-28f4-mjfq-qrvf,2020-09-03T22:18:40Z,"Malicious Package in buffes-xor",buffes-xor,0.0.0,,,CRITICAL,CWE-506,
|
|
5862
|
+
GHSA-28g4-38q8-3cwc,2026-04-16T21:54:26Z,"Flowise: Cypher Injection in GraphCypherQAChain",flowise,0,3.1.0,,HIGH,CWE-943,
|
|
5863
|
+
GHSA-28g4-38q8-3cwc,2026-04-16T21:54:26Z,"Flowise: Cypher Injection in GraphCypherQAChain",flowise-components,0,3.1.0,,HIGH,CWE-943,
|
|
5667
5864
|
GHSA-28hp-fgcr-2r4h,2019-06-27T17:25:42Z,"Cross-Site Scripting via JSONP",angular,0,1.6.0,,MODERATE,CWE-79,
|
|
5668
5865
|
GHSA-28xh-wpgr-7fm8,2019-06-20T15:35:49Z,"Command Injection in open",open,0,6.0.0,,CRITICAL,CWE-77,
|
|
5669
5866
|
GHSA-28xx-8j99-m32j,2020-09-01T20:37:25Z,"Malicious Package in nginxbeautifier",nginxbeautifier,1.0.14,1.0.15,,CRITICAL,CWE-506,
|
|
@@ -5672,7 +5869,9 @@ GHSA-2c83-wfv3-q25f,2021-09-07T23:07:56Z,"Improper Neutralization of Special Ele
|
|
|
5672
5869
|
GHSA-2cf5-4w76-r9qv,2020-09-04T14:57:38Z,"Arbitrary Code Execution in handlebars",handlebars,0,3.0.8,,HIGH,CWE-94,
|
|
5673
5870
|
GHSA-2cf5-4w76-r9qv,2020-09-04T14:57:38Z,"Arbitrary Code Execution in handlebars",handlebars,4.0.0,4.5.2,,HIGH,CWE-94,
|
|
5674
5871
|
GHSA-2ch6-x3g4-7759,2026-03-03T23:19:46Z,"OpenClaw's commands.allowFrom sender authorization accepted conversation identifiers via ctx.From",openclaw,0,2026.2.23,,HIGH,CWE-639,
|
|
5872
|
+
GHSA-2cq5-mf3v-mx44,2026-04-17T22:16:04Z,"OpenClaw: busybox and toybox applet execution weakened exec approval binding",openclaw,2026.2.23,2026.4.12,,HIGH,CWE-863,
|
|
5675
5873
|
GHSA-2cwr-f5hx-gg3w,2026-03-19T03:30:57Z,"Duplicate Advisory: OpenClaw: stageSandboxMedia destination symlink traversal can overwrite files outside sandbox workspace",openclaw,0,,2026.3.1,MODERATE,CWE-59,
|
|
5874
|
+
GHSA-2f7j-rp58-mr42,2026-04-07T18:15:44Z,"OpenClaw: Gateway hello snapshots exposed host config and state paths to non-admin clients",openclaw,0,2026.4.2,,MODERATE,CWE-200,
|
|
5676
5875
|
GHSA-2fvv-qxrq-7jq6,2022-08-18T18:55:01Z,"apollo-server-core vulnerable to URL-based XSS attack affecting IE11 on default landing page",apollo-server-core,3.0.0,3.10.1,,MODERATE,CWE-79,
|
|
5677
5876
|
GHSA-2fwq-wx47-hm6x,2020-09-04T15:31:39Z,"Malicious Package in bcion",bcion,0.0.0,,,CRITICAL,CWE-506,
|
|
5678
5877
|
GHSA-2g8g-63j4-9w3r,2021-12-01T18:29:12Z,"RCE vulnerability affecting v1beta3 templates in @backstage/plugin-scaffolder-backend","@backstage/plugin-scaffolder-backend",0,0.15.14,,HIGH,,
|
|
@@ -5681,6 +5880,7 @@ GHSA-2h3x-95c6-885r,2020-09-03T17:46:46Z,"Malicious Package in river-mock",river
|
|
|
5681
5880
|
GHSA-2hm8-rqrm-xfjq,2026-03-03T21:36:33Z,"OpenClaw's owner-only gateway tool access checks were incomplete in specific authenticated DM flows",openclaw,0,2026.2.19,,MODERATE,CWE-269;CWE-863,
|
|
5682
5881
|
GHSA-2hqf-qqmq-pgpp,2020-09-02T15:48:16Z,"Malicious Package in commander-js",commander-js,0.0.0,,,CRITICAL,CWE-506,
|
|
5683
5882
|
GHSA-2hwp-g4g7-mwwj,2019-05-29T20:25:35Z,"Reflected Cross-Site Scripting in jquery.terminal",jquery.terminal,0,1.21.0,,MODERATE,CWE-79,
|
|
5883
|
+
GHSA-2j53-2c28-g9v2,2026-04-10T00:30:30Z,"Duplicate Advisory: OpenClaw: Nostr inbound DMs could trigger unauthenticated crypto work before sender policy enforcement",openclaw,0,2026.3.22,,MODERATE,CWE-696,
|
|
5684
5884
|
GHSA-2jm5-2cqf-6vw9,2020-09-04T15:30:32Z,"Malicious Package in baes-x",baes-x,0.0.0,,,CRITICAL,CWE-506,
|
|
5685
5885
|
GHSA-2m96-9w4j-wgv7,2020-09-03T18:06:00Z,"Prototype Pollution in lodash.merge",lodash.merge,0,4.6.1,,HIGH,CWE-1321,
|
|
5686
5886
|
GHSA-2mc2-g238-722j,2026-03-03T21:35:21Z,"OpenClaw affected by iMessage remote attachment SCP hardening (strict host-key checks and remoteHost validation)",openclaw,0,2026.2.19,,MODERATE,CWE-295;CWE-78,
|
|
@@ -5691,6 +5891,8 @@ GHSA-2p3c-p3qw-69r4,2022-10-12T14:15:48Z,"The graphql-upload library included in
|
|
|
5691
5891
|
GHSA-2p62-c4rm-mr72,2020-09-01T19:44:57Z,"Malicious Package in another-date-picker",another-date-picker,2.0.43,2.0.45,,CRITICAL,CWE-506,
|
|
5692
5892
|
GHSA-2p99-6f47-8x9j,2020-09-02T18:38:39Z,"Malicious Package in asnc",asnc,0,,,CRITICAL,CWE-506,
|
|
5693
5893
|
GHSA-2pr6-76vf-7546,2019-06-05T14:35:29Z,"Denial of Service in js-yaml",js-yaml,0,3.13.0,,MODERATE,CWE-400,
|
|
5894
|
+
GHSA-2qqc-p94c-hxwh,2026-04-16T21:22:00Z,"Flowise: Weak Default Express Session Secret",flowise,0,3.1.0,,MODERATE,CWE-798,
|
|
5895
|
+
GHSA-2qrv-rc5x-2g2h,2026-04-07T18:15:41Z,"OpenClaw: Untrusted workspace channel shadows could execute during built-in channel setup",openclaw,0,2026.4.2,,MODERATE,CWE-829,
|
|
5694
5896
|
GHSA-2r8f-2665-3gxq,2020-09-02T21:36:36Z,"Malicious Package in froever",froever,0,,,CRITICAL,CWE-506,
|
|
5695
5897
|
GHSA-2rqg-gjgv-84jm,2026-03-13T20:55:30Z,"OpenClaw: Gateway `agent` calls could override the workspace boundary",openclaw,0,2026.3.11,,HIGH,CWE-668,
|
|
5696
5898
|
GHSA-2vqq-jgxx-fxjc,2020-09-11T21:24:33Z,"Malicious Package in motiv.scss",motiv.scss,0.4.20,0.4.21,,CRITICAL,CWE-506,
|
|
@@ -5698,19 +5900,23 @@ GHSA-2w79-r9g8-wmcr,2026-04-03T03:13:35Z,"OpenClaw: Voice-call still parses larg
|
|
|
5698
5900
|
GHSA-2w8g-m5j8-7m87,2022-01-12T21:45:59Z,"Zalgo-like output that crashes the server",@soketi/soketi,0,0.26.1,,CRITICAL,,
|
|
5699
5901
|
GHSA-2w8q-69fh-9gq6,2020-09-03T22:25:09Z,"Malicious Package in bufger-xor",bufger-xor,0.0.0,,,CRITICAL,CWE-506,
|
|
5700
5902
|
GHSA-2w9p-xf5h-qwj3,2023-03-27T03:30:16Z,"Duplicate Advisory: pullit Command Injection vulnerability",pullit,0,,,HIGH,,
|
|
5903
|
+
GHSA-2x8m-83vc-6wv4,2026-04-16T21:51:00Z,"Flowise: SSRF Protection Bypass (TOCTOU & Default Insecure)",flowise,0,3.1.0,,HIGH,CWE-918;CWE-367,
|
|
5904
|
+
GHSA-2x8m-83vc-6wv4,2026-04-16T21:51:00Z,"Flowise: SSRF Protection Bypass (TOCTOU & Default Insecure)",flowise-components,0,3.1.0,,HIGH,CWE-918;CWE-367,
|
|
5701
5905
|
GHSA-2xv3-h762-ccxv,2019-05-29T19:18:02Z,"Out-of-bounds Read in concat-with-sourcemaps",concat-with-sourcemaps,1.0.0,1.0.6,,MODERATE,CWE-125,
|
|
5702
5906
|
GHSA-2xw5-3767-qxvm,2020-09-11T21:21:20Z,"Malicious Package in ng-ui-library",ng-ui-library,1.0.987,1.0.990,,CRITICAL,CWE-506,
|
|
5703
5907
|
GHSA-3233-rgx3-c2wh,2018-10-09T00:38:09Z,"Moderate severity vulnerability that affects mustache",mustache,0,2.2.1,,MODERATE,,
|
|
5704
|
-
GHSA-3298-56p6-rpw2,2026-03-30T18:30:01Z,"OpenClaw has incomplete Fix for CVE-2026-27486: Unvalidated SIGKILL in `!stop` Chat Command via `shell-utils.ts`",openclaw,0,2026.3.24,,MODERATE,CWE-404,
|
|
5705
5908
|
GHSA-32vw-r77c-gm67,2020-08-03T17:57:05Z,"Withdrawn Advisory: marked cross-site scripting vulnerability",marked,0,0.3.3,,MODERATE,,
|
|
5706
5909
|
GHSA-33gc-f8v9-v8hm,2020-09-01T20:41:40Z,"Malicious Package in ladder-text-js",ladder-text-js,0,,,CRITICAL,CWE-506,
|
|
5707
5910
|
GHSA-33hq-fvwr-56pm,2026-02-19T20:29:30Z,"devalue affected by CPU and memory amplification from sparse arrays",devalue,0,5.6.3,,LOW,CWE-770,
|
|
5911
|
+
GHSA-33r3-4whc-44c2,2026-04-16T01:02:48Z," Path traversal in vite-plus/binding downloadPackageManager() writes outside VP_HOME",vite-plus,0,0.1.17,,HIGH,CWE-22,
|
|
5708
5912
|
GHSA-353r-3v84-9pjj,2020-09-01T20:40:36Z,"Malicious Package in nothing-js",nothing-js,0,,,CRITICAL,CWE-506,
|
|
5913
|
+
GHSA-35cq-wv6v-88xf,2026-03-31T15:31:56Z,"Duplicate Advisory: OpenClaw affected by SSRF via unguarded image download in fal provider",openclaw,0,2026.3.28,,MODERATE,CWE-918,
|
|
5709
5914
|
GHSA-364x-8g5j-x2pr,2026-03-27T18:08:15Z,"n8n has XSS in its Credential Management Flow",n8n,0,2.6.4,,MODERATE,CWE-79,
|
|
5710
5915
|
GHSA-364x-8g5j-x2pr,2026-03-27T18:08:15Z,"n8n has XSS in its Credential Management Flow",n8n,2.7.0,2.8.0,,MODERATE,CWE-79,
|
|
5711
5916
|
GHSA-365g-vjw2-grx8,2025-10-09T15:26:59Z,"n8n: Execute Command Node Allows Authenticated Users to Run Arbitrary Commands on Host",n8n,0,,1.114.4,HIGH,CWE-78,
|
|
5712
5917
|
GHSA-365g-vjw2-grx8,2025-10-09T15:26:59Z,"n8n: Execute Command Node Allows Authenticated Users to Run Arbitrary Commands on Host",n8n-nodes-base,0,,1.113.0,HIGH,CWE-78,
|
|
5713
5918
|
GHSA-36c4-4r89-6whg,2020-09-03T15:49:02Z,"Prototype Pollution in @commercial/subtext",@commercial/subtext,0,5.1.2,,HIGH,CWE-1321,
|
|
5919
|
+
GHSA-36cp-mh65-x882,2026-04-10T00:30:30Z,"Duplicate Advisory: OpenClaw is vulnerable to unauthenticated resource exhaustion through its voice call webhook handling",openclaw,0,2026.3.22,,MODERATE,CWE-405,
|
|
5714
5920
|
GHSA-36j9-mx87-2cff,2026-01-13T20:28:41Z,"Renovate vulnerable to arbitrary command injection via hermit manager and maliciously named dependencies",renovate,32.135.0,40.33.0,,MODERATE,CWE-77,
|
|
5715
5921
|
GHSA-36jr-mh4h-2g58,2022-09-29T14:12:55Z,"d3-color vulnerable to ReDoS",d3-color,0,3.1.0,,HIGH,CWE-400,
|
|
5716
5922
|
GHSA-36r8-9qq7-mh43,2020-09-03T17:02:40Z,"Malicious Package in we3b",we3b,0.0.0,,,CRITICAL,CWE-506,
|
|
@@ -5726,9 +5932,7 @@ GHSA-38cw-85xc-xr9x,2026-01-16T21:04:12Z,"Veramo is Vulnerable to SQL Injection
|
|
|
5726
5932
|
GHSA-38hx-3542-8fh3,2020-10-01T17:09:56Z,"Malicious code in `electorn`",electorn,0,,10.0.0,CRITICAL,CWE-506,
|
|
5727
5933
|
GHSA-38vq-cjh5-vw7x,2020-09-03T18:13:41Z,"Malicious Package in nodes.js",nodes.js,0.0.0,,,CRITICAL,CWE-506,
|
|
5728
5934
|
GHSA-392f-ggf5-fp3c,2026-03-02T21:49:33Z,"OpenClaw: Unicode canonicalization drift in node metadata policy classification could broaden node allowlists",openclaw,0,2026.3.1,,MODERATE,CWE-176;CWE-436,
|
|
5729
|
-
GHSA-
|
|
5730
|
-
GHSA-39mp-545q-w789,2026-03-30T19:06:22Z,"OpenClaw: Non-owner command-authorized sender can change the owner-only `/send` session delivery policy",openclaw,0,2026.3.24,,MODERATE,CWE-285,
|
|
5731
|
-
GHSA-39pp-xp36-q6mg,2026-03-26T19:51:12Z,"OpenClaw has Inconsistent Host Exec Environment Override Sanitization",openclaw,0,2026.3.22,,HIGH,CWE-15;CWE-693,
|
|
5935
|
+
GHSA-39q2-94rc-95cp,2026-04-16T00:46:35Z,"DOMPurify's ADD_TAGS function form bypasses FORBID_TAGS due to short-circuit evaluation",dompurify,0,3.4.0,,MODERATE,CWE-783,
|
|
5732
5936
|
GHSA-3c7f-5hgj-h279,2026-03-27T18:06:49Z,"n8n has XSS in Chat Trigger Node through Custom CSS",n8n,0,1.123.27,,MODERATE,CWE-79,
|
|
5733
5937
|
GHSA-3c7f-5hgj-h279,2026-03-27T18:06:49Z,"n8n has XSS in Chat Trigger Node through Custom CSS",n8n,2.0.0-rc.0,2.13.3,,MODERATE,CWE-79,
|
|
5734
5938
|
GHSA-3c7f-5hgj-h279,2026-03-27T18:06:49Z,"n8n has XSS in Chat Trigger Node through Custom CSS",n8n,2.14.0,2.14.1,,MODERATE,CWE-79,
|
|
@@ -5739,11 +5943,11 @@ GHSA-3f44-xw83-3pmg,2026-01-13T20:29:12Z,"Renovate vulnerable to arbitrary comma
|
|
|
5739
5943
|
GHSA-3f95-w5h5-fq86,2020-09-11T21:22:24Z,"Prototype Pollution in mergify",mergify,0,,,MODERATE,CWE-1321,
|
|
5740
5944
|
GHSA-3f97-rj68-2pjf,2020-09-03T21:48:35Z,"Malicious Package in buffe2-xor",buffe2-xor,0.0.0,,,CRITICAL,CWE-506,
|
|
5741
5945
|
GHSA-3fc5-9x9m-vqc4,2019-06-03T17:31:32Z,"Duplicate Advisory: Privilege Escalation in express-cart",express-cart,0,1.1.6,,CRITICAL,,
|
|
5946
|
+
GHSA-3fv3-6p2v-gxwj,2026-04-09T17:36:20Z,"OpenClaw QQ Bot Extension missing SSRF Protection on All Media Fetch Paths",openclaw,0,2026.4.8,,MODERATE,CWE-918,
|
|
5742
5947
|
GHSA-3g4j-r53p-22wx,2025-10-17T18:31:09Z,"Duplicate Advisory: FlowiseAI Pre-Auth Arbitrary Code Execution",flowise,3.0.5,3.0.6,,CRITICAL,CWE-94,
|
|
5743
5948
|
GHSA-3gpc-w23c-w59w,2020-09-04T15:02:06Z,"Sandbox Breakout / Arbitrary Code Execution in pitboss-ng",pitboss-ng,0,2.0.0,,CRITICAL,,
|
|
5744
5949
|
GHSA-3gr8-2752-h46q,2026-03-31T15:31:56Z,"Duplicate Advisory: OpenClaw's message tool media parameter bypasses tool policy filesystem isolation",openclaw,0,2026.3.24,,HIGH,CWE-22,
|
|
5745
5950
|
GHSA-3h2q-j2v4-6w5r,2026-03-09T19:53:58Z,"OpenClaw's system.run allowlist approval parsing missed PowerShell encoded-command wrappers",openclaw,0,2026.3.7,,MODERATE,CWE-184;CWE-863,
|
|
5746
|
-
GHSA-3h52-cx59-c456,2026-03-29T15:48:58Z,"OpenClaw: Feishu webhook reads and parses unauthenticated request bodies before signature validation",openclaw,0,2026.3.28,,MODERATE,CWE-400,
|
|
5747
5951
|
GHSA-3h99-v4qw-p2h5,2020-09-03T19:41:56Z,"Malicious Package in coinpayment",coinpayment,0.0.0,,,CRITICAL,CWE-506,
|
|
5748
5952
|
GHSA-3h9m-9g3g-5wqx,2020-09-03T22:13:14Z,"Malicious Package in buffer-xov",buffer-xov,0.0.0,,,CRITICAL,CWE-506,
|
|
5749
5953
|
GHSA-3hfp-gqgh-xc5g,2026-04-02T18:36:10Z,"Axios supply chain attack - dependency in @lightdash/cli may resolve to compromised axios versions",@lightdash/cli,0.1800.0,0.2695.1,,CRITICAL,CWE-1395;CWE-508,
|
|
@@ -5758,62 +5962,80 @@ GHSA-3mpp-xfvh-qh37,2022-03-16T23:54:35Z,"node-ipc behavior change",node-ipc,11.
|
|
|
5758
5962
|
GHSA-3p2x-hjxj-c7rv,2026-03-21T03:31:13Z,"Duplicate Advisory: OpenClaw's system.run approval TOCTOU via mutable symlink cwd target on node host",openclaw,0,,2026.2.24,MODERATE,CWE-367,
|
|
5759
5963
|
GHSA-3p92-886g-qxpq,2019-06-04T15:42:32Z,"Remote Memory Exposure in floody",floody,0,0.1.1,,MODERATE,CWE-201,
|
|
5760
5964
|
GHSA-3pm9-5j7m-59vc,2026-04-03T03:20:16Z,"OpenClaw: Tlon Startup Migration Rehydrates Empty-Array Revocations From File Config",openclaw,0,2026.3.31,,LOW,CWE-436,
|
|
5965
|
+
GHSA-3prp-9gf7-4rxx,2026-04-17T21:34:16Z,"Flowise: Mass Assignment in DocumentStore Create Endpoint Leads to Cross-Workspace Object Takeover (IDOR)",flowise,0,3.1.0,,HIGH,CWE-284;CWE-639;CWE-915,
|
|
5966
|
+
GHSA-3pw3-v88x-xj24,2026-04-16T22:45:14Z,"Paperclip: Arbitrary File Read via Agent-Controlled adapterConfig.instructionsFilePath",@paperclipai/shared,0,2026.416.0,,MODERATE,CWE-73,
|
|
5967
|
+
GHSA-3q42-xmxv-9vfr,2026-04-07T18:11:02Z,"OpenClaw: Gateway operator.write Can Reach Admin-Class Talk Voice Config Persistence via chat.send",openclaw,0,2026.3.28,,MODERATE,CWE-269,
|
|
5761
5968
|
GHSA-3qmc-2r76-4rqp,2022-11-10T15:51:01Z,"Redwood is vulnerable to account takeover via dbAuth ""forgot-password"" ",@redwoodjs/api,0.38.0,2.2.5,,HIGH,,
|
|
5762
5969
|
GHSA-3qmc-2r76-4rqp,2022-11-10T15:51:01Z,"Redwood is vulnerable to account takeover via dbAuth ""forgot-password"" ",@redwoodjs/api,3.0.0,3.3.1,,HIGH,,
|
|
5763
5970
|
GHSA-3qpv-xf3v-mm45,2026-04-02T21:00:16Z,"OpenClaw: Workspace `.env` can override the bundled hooks root and load attacker hook code",openclaw,0,2026.3.31,,HIGH,CWE-15,
|
|
5764
5971
|
GHSA-3r78-rqg8-95gg,2026-03-21T03:31:14Z,"Duplicate Advisory: OpenClaw's voice-call Twilio webhook replay could bypass manager dedupe because normalized event IDs were randomized per parse",openclaw,0,,,MODERATE,CWE-294,
|
|
5765
5972
|
GHSA-3rw8-4xrq-3f7p,2025-03-17T21:30:34Z,"Duplicate Advisory: Uptime Kuma ReDoS vulnerability",uptime-kuma,1.23.0,,2.0.0-dev.0,MODERATE,CWE-1333,
|
|
5973
|
+
GHSA-3vvq-q2qc-7rmp,2026-04-09T17:37:13Z,"OpenClaw B-M3: ClawHub package downloads are not enforced with integrity verification",openclaw,0,2026.4.8,,MODERATE,CWE-353,
|
|
5766
5974
|
GHSA-3w6x-gv34-mqpf,2026-03-26T21:24:34Z,"OpenClaw's mutating internal ACP chat commands missed operator.admin scope enforcement",openclaw,0,2026.3.22,,HIGH,CWE-862,
|
|
5767
5975
|
GHSA-3wqh-h42r-x8fq,2020-09-03T15:46:22Z,"Denial of Service in @hapi/content",@hapi/content,0,5.0.2,,HIGH,,
|
|
5768
5976
|
GHSA-3xc7-xg67-pw99,2019-06-05T20:43:10Z,"Sensitive Data Exposure in sequelize-cli",sequelize-cli,0,,5.4.0,LOW,CWE-532,
|
|
5769
5977
|
GHSA-3xv9-89fm-7h4r,2026-04-03T03:24:25Z,"OpenClaw: diffs viewer misclassifies proxied remote requests as loopback when `allowRemoteViewer` is disabled",openclaw,0,2026.3.31,,MODERATE,CWE-348,
|
|
5978
|
+
GHSA-3xx2-mqjm-hg9x,2026-04-16T22:49:46Z,"Paperclip: Cross-tenant agent API key IDOR in `/agents/:id/keys` routes allows full victim-company compromise",@paperclipai/server,0,2026.416.0,,CRITICAL,CWE-639,
|
|
5979
|
+
GHSA-42mx-vp8m-j7qh,2026-04-07T18:11:21Z,"OpenClaw: OpenShell `mirror` mode can convert untrusted sandbox files into explicitly enabled workspace hooks and execute them on the host during gateway startup",openclaw,0,2026.3.28,,MODERATE,CWE-829,
|
|
5770
5980
|
GHSA-435c-qcpm-wjw5,2020-09-03T17:05:43Z,"Malicious Package in fs-extar",fs-extar,0.0.0,,,CRITICAL,CWE-506,
|
|
5771
5981
|
GHSA-4363-x42f-xph6,2020-09-03T17:05:14Z,"Malicious Package in hw-trnasport-u2f",hw-trnasport-u2f,0.0.0,,,CRITICAL,CWE-506,
|
|
5982
|
+
GHSA-43fj-qp3h-hrh5,2026-04-15T18:57:50Z,"Sync-in Server has Username Enumeration via Timing Attack",@sync-in/server,0,2.2.0,,MODERATE,CWE-208,
|
|
5772
5983
|
GHSA-43vf-2x6g-p2m5,2020-09-02T21:33:26Z,"Malicious Package in browserift",browserift,0,,,CRITICAL,CWE-506,
|
|
5773
5984
|
GHSA-442j-39wm-28r2,2026-03-29T15:16:37Z,"Handlebars.js has a Property Access Validation Bypass in container.lookup",handlebars,4.0.0,4.7.9,,LOW,CWE-367,
|
|
5774
5985
|
GHSA-44c9-4rg5-qjgq,2026-03-19T03:30:57Z,"Duplicate Advisory: web_search citation redirect SSRF via private-network-allowing policy",openclaw,0,,,MODERATE,CWE-918,
|
|
5775
5986
|
GHSA-44vf-8ffm-v2qh,2020-09-02T15:42:47Z,"Sensitive Data Exposure in rails-session-decoder",rails-session-decoder,0.0.0,,,HIGH,,
|
|
5776
5987
|
GHSA-457r-cqc8-9vj9,2022-11-23T15:39:50Z,"sweetalert2 v10.16.10 and above contains hidden functionality",sweetalert2,10.16.10,11.22.4,,LOW,CWE-912,
|
|
5988
|
+
GHSA-458j-xx4x-4375,2026-04-16T01:02:24Z,"hono Improperly Handles JSX Attribute Names Allows HTML Injection in hono/jsx SSR",hono,0,4.12.14,,MODERATE,CWE-79,
|
|
5989
|
+
GHSA-45q2-gjvg-7973,2026-04-16T22:36:01Z,"Angular: SSRF via protocol-relative and backslash URLs in Angular Platform-Server",@angular/platform-server,0,,18.2.14,HIGH,CWE-918,
|
|
5990
|
+
GHSA-45q2-gjvg-7973,2026-04-16T22:36:01Z,"Angular: SSRF via protocol-relative and backslash URLs in Angular Platform-Server",@angular/platform-server,19.0.0-next.0,19.2.21,,HIGH,CWE-918,
|
|
5991
|
+
GHSA-45q2-gjvg-7973,2026-04-16T22:36:01Z,"Angular: SSRF via protocol-relative and backslash URLs in Angular Platform-Server",@angular/platform-server,20.0.0-next.0,20.3.19,,HIGH,CWE-918,
|
|
5992
|
+
GHSA-45q2-gjvg-7973,2026-04-16T22:36:01Z,"Angular: SSRF via protocol-relative and backslash URLs in Angular Platform-Server",@angular/platform-server,21.0.0-next.0,21.2.9,,HIGH,CWE-918,
|
|
5993
|
+
GHSA-45q2-gjvg-7973,2026-04-16T22:36:01Z,"Angular: SSRF via protocol-relative and backslash URLs in Angular Platform-Server",@angular/platform-server,22.0.0-next.0,22.0.0-next.8,,HIGH,CWE-918,
|
|
5777
5994
|
GHSA-4627-w373-375v,2020-09-11T21:22:24Z,"Malicious Package in grunt-radical",grunt-radical,0.0.14,0.0.13,,CRITICAL,,
|
|
5778
5995
|
GHSA-46fh-8fc5-xcwx,2020-09-03T18:09:16Z,"Prototype Pollution in lodash.defaultsdeep",lodash.defaultsdeep,0,4.6.1,,HIGH,CWE-1321,
|
|
5779
5996
|
GHSA-46j5-6fg5-4gv3,2025-12-18T09:30:30Z,"Duplicate Advisory: Nodemailer is vulnerable to DoS through Uncontrolled Recursion",nodemailer,0,7.0.11,,MODERATE,CWE-674;CWE-703,
|
|
5780
5997
|
GHSA-474h-prjg-mmw3,2026-03-03T21:31:57Z,"OpenClaw: Sandboxed sessions_spawn(runtime=""acp"") bypassed sandbox inheritance and allowed host ACP initialization",openclaw,0,2026.3.2,,HIGH,CWE-269,
|
|
5998
|
+
GHSA-47wq-cj9q-wpmp,2026-04-16T22:48:32Z,"Paperclip: Cross-tenant agent API token minting via missing assertCompanyAccess on /api/agents/:id/keys",@paperclipai/server,0,2026.416.0,,CRITICAL,"CWE-1220;CWE-285;CWE-639;CWE-862",
|
|
5781
5999
|
GHSA-4859-gpc7-4j66,2019-06-05T21:24:29Z,"Command Injection in dot",dot,0,,1.1.2,MODERATE,CWE-77,
|
|
5782
6000
|
GHSA-48gc-5j93-5cfq,2020-09-11T21:15:54Z,"Path Traversal in serve",serve,0,10.1.2,,HIGH,CWE-22,
|
|
6001
|
+
GHSA-48m6-ch88-55mj,2026-04-16T21:44:24Z,"Flowise: Improper Mass Assignment in Account Registration Enables Unauthorized Organization Association",flowise,0,3.1.0,,HIGH,CWE-20;CWE-639;CWE-915,
|
|
5783
6002
|
GHSA-48vw-m3qc-wr99,2026-03-26T19:50:59Z,"OpenClaw's Trusted-proxy Control UI sessions retain privileged scopes without device identity on device-less allow paths",openclaw,0,2026.3.22,,HIGH,,
|
|
5784
6003
|
GHSA-4964-cjrr-jg97,2020-09-02T21:38:43Z,"Malicious Package in jqeury",jqeury,0,,,CRITICAL,CWE-506,
|
|
5785
6004
|
GHSA-49c6-3wr4-8jr4,2020-09-04T15:05:26Z,"Malicious Package in malicious-npm-package",malicious-npm-package,0.0.0,,,CRITICAL,CWE-506,
|
|
6005
|
+
GHSA-49cg-279w-m73x,2026-04-17T21:55:54Z,"OpenClaw: Empty approver lists could grant explicit approval authorization",openclaw,0,2026.4.12,,MODERATE,CWE-862,
|
|
5786
6006
|
GHSA-49mg-94fc-2fx6,2020-09-04T17:32:49Z,"Command Injection in npm-git-publish",npm-git-publish,0.0.0,,,CRITICAL,CWE-77,
|
|
5787
6007
|
GHSA-49r3-3h96-rwj6,2019-06-13T19:09:31Z,"Cross-Site Scripting in ids-enterprise",ids-enterprise,0,4.18.2,,HIGH,CWE-79,
|
|
5788
6008
|
GHSA-49vv-6q7q-w5cf,2021-12-10T17:22:12Z,"Duplicate Advisory: OS Command Injection in Strapi",strapi,0,3.0.0-beta.17.8,,HIGH,CWE-20;CWE-78,
|
|
5789
6009
|
GHSA-4cqv-h74h-93j4,2026-03-03T21:49:41Z,"OpenClaw has a Discord `allowFrom` slug-collision authorization bypass",openclaw,0,2026.2.22,,MODERATE,CWE-287,
|
|
6010
|
+
GHSA-4f8g-77mw-3rxc,2026-04-09T17:36:53Z,"OpenClaw: Gateway plugin HTTP `auth: gateway` widens identity-bearing `operator.read` requests into runtime `operator.write`",openclaw,0,2026.4.8,,LOW,CWE-269,
|
|
5790
6011
|
GHSA-4f9m-pxwh-68hg,2020-09-11T21:20:14Z,"Cross-Site Scripting in swagger-ui",swagger-ui,0,3.20.9,,MODERATE,CWE-79,
|
|
5791
6012
|
GHSA-4fqg-89cc-5pv5,2020-09-04T14:58:44Z,"Malicious Package in sj-labc",sj-labc,0.0.0,,,CRITICAL,CWE-506,
|
|
5792
6013
|
GHSA-4fr9-3x69-36wv,2025-10-03T19:27:06Z,"Flowise vulnerable to XSS",flowise,0,3.0.8,,MODERATE,CWE-79,
|
|
5793
6014
|
GHSA-4g2x-vq5p-5vj6,2024-03-01T20:09:00Z,"Budibase affected by VM2 Constructor Escape Vulnerability",@budibase/server,0,2.20.0,,CRITICAL,CWE-94,
|
|
5794
6015
|
GHSA-4g53-vp7q-gfjv,2021-05-28T19:18:28Z,"constructEvent does not verify header","@worker-tools/stripe-webhook",0,1.1.4,,HIGH,,
|
|
6016
|
+
GHSA-4g5x-2jfc-xm98,2026-04-07T18:10:41Z,"OpenClaw: Tlon media downloads can bypass core safety limits and exhaust disk",openclaw,0,2026.3.31,,MODERATE,CWE-434,
|
|
5795
6017
|
GHSA-4gpv-cvmq-6526,2020-08-19T22:23:09Z,"Denial of Service in protobufjs",protobufjs,0,5.0.3,,MODERATE,,
|
|
5796
6018
|
GHSA-4gpv-cvmq-6526,2020-08-19T22:23:09Z,"Denial of Service in protobufjs",protobufjs,6.0.0,6.8.6,,MODERATE,,
|
|
5797
6019
|
GHSA-4hfc-fv33-ph9p,2020-09-03T23:26:33Z,"Malicious Package in sj-tw-abc",sj-tw-abc,0.0.0,,,CRITICAL,CWE-506,
|
|
5798
6020
|
GHSA-4hjg-w3ww-38c6,2020-09-03T18:03:49Z,"Malicious Package in tiar",tiar,0.0.0,,,CRITICAL,CWE-506,
|
|
5799
6021
|
GHSA-4hm7-73ch-vm59,2020-09-03T21:49:43Z,"Malicious Package in buffer-8or",buffer-8or,0.0.0,,,CRITICAL,CWE-506,
|
|
5800
|
-
GHSA-4hmj-39m8-jwc7,2026-03-29T15:50:41Z,"OpenClaw has ACP CLI approval prompt ANSI escape sequence injection",openclaw,2026.2.13,2026.3.28,,MODERATE,CWE-116;CWE-150,
|
|
5801
6022
|
GHSA-4hq8-v42x-9wx3,2020-09-04T16:51:52Z,"Malicious Package in bs85check",bs85check,0.0.0,,,CRITICAL,CWE-506,
|
|
5802
6023
|
GHSA-4hxc-9384-m385,2026-03-20T20:50:38Z,"h3: SSE Event Injection via Unsanitized Carriage Return (`\r`) in EventStream Data and Comment Fields (Bypass of CVE Fix)",h3,0,1.15.9,,MODERATE,CWE-74,
|
|
5803
6024
|
GHSA-4hxc-9384-m385,2026-03-20T20:50:38Z,"h3: SSE Event Injection via Unsanitized Carriage Return (`\r`) in EventStream Data and Comment Fields (Bypass of CVE Fix)",h3,2.0.0-beta.0,2.0.1-rc.17,,MODERATE,CWE-74,
|
|
5804
6025
|
GHSA-4j6x-w426-6rc6,2019-11-08T17:31:17Z,"Default Express middleware security check is ignored in production","@cubejs-backend/api-gateway",0.11.0,0.11.17,,HIGH,,
|
|
5805
6026
|
GHSA-4jfq-q299-g4cr,2020-09-02T20:28:57Z,"Malicious Package in reqquest",reqquest,0,,,CRITICAL,CWE-506,
|
|
6027
|
+
GHSA-4jpm-cgx2-8h37,2026-04-16T21:44:49Z,"Flowise: Sensitive Data Leak in public-chatbotConfig ",flowise,0,3.1.0,,HIGH,CWE-200;CWE-522;CWE-862,
|
|
5806
6028
|
GHSA-4jpw-hj22-2xmc,2026-03-13T15:47:29Z,"OpenClaw: Pairing-scoped device tokens could mint `operator.admin` and reach node RCE",openclaw,0,2026.3.11,,CRITICAL,CWE-269,
|
|
5807
6029
|
GHSA-4jqc-jvh2-pxg9,2022-06-17T01:11:10Z,"Path traversal for local publishers in TechDocs backend","@backstage/plugin-techdocs-node",0,1.1.2,,MODERATE,,
|
|
5808
6030
|
GHSA-4jqc-jvh2-pxg9,2022-06-17T01:11:10Z,"Path traversal for local publishers in TechDocs backend","@backstage/techdocs-common",0,0.11.16,,MODERATE,,
|
|
5809
6031
|
GHSA-4m3j-h8f2-4xh4,2020-09-03T19:41:31Z,"Malicious Package in coinstrig",coinstrig,0.0.0,,,CRITICAL,CWE-506,
|
|
5810
6032
|
GHSA-4m3p-x2hp-2pgx,2020-09-04T16:45:23Z,"Malicious Package in bitcroe-lib",bitcroe-lib,0.0.0,,,CRITICAL,CWE-506,
|
|
6033
|
+
GHSA-4p4f-fc8q-84m3,2026-04-07T18:15:03Z,"OpenClaw: iOS A2UI bridge trusted generic local-network pages for agent.request dispatch",openclaw,0,2026.4.2,,MODERATE,CWE-284,
|
|
5811
6034
|
GHSA-4pmg-jgm5-3jg6,2020-09-02T21:16:26Z,"Malicious Package in erquest",erquest,0,,,CRITICAL,CWE-506,
|
|
5812
6035
|
GHSA-4q2f-8g74-qm56,2020-09-03T17:18:05Z,"Cross-Site Scripting in takeapeek",takeapeek,0.0.0,,,HIGH,CWE-79,
|
|
5813
6036
|
GHSA-4q8f-5xxj-946r,2020-09-03T02:40:51Z,"Command Injection in addax",addax,0,1.1.0,,HIGH,CWE-77,
|
|
5814
6037
|
GHSA-4qhx-g9wp-g9m6,2019-06-14T16:09:01Z,"Failure to sanitize quotes which can lead to sql injection in squel",squel,0,,5.13.0,CRITICAL,CWE-74;CWE-89,
|
|
5815
6038
|
GHSA-4qqc-mp5f-ccv4,2020-09-02T15:05:51Z,"Command Injection in bestzip",bestzip,0,2.1.7,,CRITICAL,CWE-77,
|
|
5816
|
-
GHSA-4qwc-c7g9-4xcw,2026-03-26T19:50:06Z,"OpenClaw: Remote media error responses could trigger unbounded memory allocation before failure",openclaw,0,2026.3.22,,HIGH,CWE-400;CWE-770,
|
|
5817
6039
|
GHSA-4r97-78gf-q24v,2020-09-04T17:53:27Z,"Duplicate Advisory: Prototype Pollution in klona",klona,0,1.1.1,,HIGH,CWE-1321,
|
|
5818
6040
|
GHSA-4rgj-8mq3-hggj,2020-09-03T20:32:11Z,"Denial of Service in @hapi/subtext",@hapi/subtext,0,6.1.2,,HIGH,CWE-400,
|
|
5819
6041
|
GHSA-4vcf-q4xf-f48m,2025-11-25T21:42:53Z,"Better Auth Passkey Plugin allows passkey deletion through IDOR",@better-auth/passkey,0,1.4.0,,HIGH,CWE-284;CWE-639,
|
|
@@ -5824,6 +6046,7 @@ GHSA-4w7m-58cg-cmff,2026-03-13T15:47:34Z,"OpenClaw: Leaf subagents could steer s
|
|
|
5824
6046
|
GHSA-4wcx-c9c4-89p2,2020-09-11T21:23:30Z,"Malicious Package in react-datepicker-plus",react-datepicker-plus,2.4.2,2.4.6,,CRITICAL,CWE-506,
|
|
5825
6047
|
GHSA-4whq-r978-2x68,2021-05-04T17:43:52Z,"Arbitrary code execution in ExifTool",exiftool-vendored,0,14.3.0,,HIGH,CWE-74,
|
|
5826
6048
|
GHSA-4wv4-mgfq-598v,2021-03-12T23:00:19Z,"Code injection in nobelprizeparser",nobelprizeparser,0,1.0.2,,CRITICAL,CWE-94,
|
|
6049
|
+
GHSA-4x48-cgf9-q33f,2026-04-14T23:22:48Z,"Novu has SSRF via conditions filter webhook bypasses validateUrlSsrf() protection",@novu/api,0,3.15.0,,HIGH,CWE-918,
|
|
5827
6050
|
GHSA-4x6x-782q-jfc4,2020-09-03T02:38:47Z,"Command Injection in node-wifi",node-wifi,0,2.0.12,,CRITICAL,CWE-77,
|
|
5828
6051
|
GHSA-4x7c-cx64-49w8,2020-08-19T22:06:03Z,"Regular Expression Denial of Service in is-my-json-valid",is-my-json-valid,0,1.4.1,,LOW,,
|
|
5829
6052
|
GHSA-4x7c-cx64-49w8,2020-08-19T22:06:03Z,"Regular Expression Denial of Service in is-my-json-valid",is-my-json-valid,2.0.0,2.17.2,,LOW,,
|
|
@@ -5832,17 +6055,22 @@ GHSA-4xcv-9jjx-gfj3,2019-07-05T21:07:58Z,"Denial of Service in mem",mem,0,4.0.0,
|
|
|
5832
6055
|
GHSA-4xf9-pgvv-xx67,2020-09-03T20:27:46Z,"Duplicate Advisory: Regular Expression Denial of Service in simple-markdown",simple-markdown,0,0.5.2,,MODERATE,CWE-400,
|
|
5833
6056
|
GHSA-4xg9-g7qj-jhg4,2020-09-03T20:46:36Z,"Malicious Package in comander",comander,0.0.0,,,CRITICAL,CWE-506,
|
|
5834
6057
|
GHSA-4xgp-xrg3-c73w,2020-09-11T21:10:29Z,"Malicious Package in commqnder",commqnder,0,,,CRITICAL,CWE-506,
|
|
6058
|
+
GHSA-525j-hqq2-66r4,2026-04-17T21:59:55Z,"OpenClaw: Sandbox browser CDP relay could expose DevTools protocol on 0.0.0.0",openclaw,0,2026.4.10,,HIGH,CWE-1327;CWE-284,
|
|
6059
|
+
GHSA-527m-976r-jf79,2026-04-17T22:11:33Z,"OpenClaw: Existing-session browser interaction routes bypassed SSRF policy enforcement",openclaw,0,2026.4.10,,MODERATE,CWE-918,
|
|
5835
6060
|
GHSA-52c9-458g-whrf,2020-09-03T22:58:17Z,"Malicious Package in js-3ha3",js-3ha3,0.0.0,,,CRITICAL,CWE-506,
|
|
5836
|
-
GHSA-52q4-3xjc-6778,2026-03-29T15:48:15Z,"OpenClaw: Google Chat Authz Bypass via Group Policy Rebinding with Mutable Space displayName",openclaw,0,2026.3.28,,MODERATE,CWE-639;CWE-807;CWE-863,
|
|
5837
6061
|
GHSA-52rh-5rpj-c3w6,2022-05-05T16:00:50Z,"Improper handling of multiline messages in node-irc",matrix-org-irc,0,1.2.1,,HIGH,CWE-74;CWE-93,
|
|
5838
6062
|
GHSA-5326-6f73-m96w,2026-03-19T03:30:57Z,"Duplicate Advisory: OpenClaw macOS companion app (beta): allowlist parsing mismatch for system.run shell chains",openclaw,0,,,MODERATE,CWE-184,
|
|
5839
6063
|
GHSA-5327-gfq5-8f4m,2020-09-03T21:56:23Z,"Malicious Package in buffer-xmr",buffer-xmr,0.0.0,,,CRITICAL,CWE-506,
|
|
5840
6064
|
GHSA-533p-g2hq-qr26,2020-09-04T17:16:35Z,"Command Injection in treekill",treekill,0.0.0,,,HIGH,CWE-77,
|
|
6065
|
+
GHSA-533q-w4g6-5586,2026-04-16T21:13:40Z,"PsiTransfer: Upload PATCH path traversal can create `config.<NODE_ENV>.js` and lead to code execution on restart",psitransfer,0,2.4.3,,HIGH,CWE-22,
|
|
5841
6066
|
GHSA-534w-2vm4-89xr,2026-03-03T23:18:26Z,"OpenClaw's Zalo group sender allowlist bypass permits unauthorized GROUP dispatch",openclaw,0,2026.2.24,,MODERATE,CWE-284;CWE-863,
|
|
5842
6067
|
GHSA-536f-268f-6gxc,2020-09-03T22:17:36Z,"Malicious Package in buffermxor",buffermxor,0.0.0,,,CRITICAL,CWE-506,
|
|
6068
|
+
GHSA-536q-mj95-h29h,2026-04-17T22:14:29Z,"OpenClaw: Browser press/type interaction routes missed complete navigation guard coverage",openclaw,0,2026.4.10,,MODERATE,CWE-918,
|
|
5843
6069
|
GHSA-53mj-mc38-q894,2020-09-01T19:40:41Z,"Remote Memory Exposure in openwhisk",openwhisk,0,3.3.1,,MODERATE,,
|
|
5844
6070
|
GHSA-53p3-c7vp-4mcc,2026-03-29T15:22:17Z,"Trix is vulnerable to XSS through JSON deserialization bypass in drag-and-drop (Level0InputController)",trix,0,2.1.18,,LOW,CWE-79,
|
|
5845
6071
|
GHSA-53rv-hcvm-rpp9,2025-01-14T22:03:59Z,"Lodestar snappy decompression issue",@lodestar/reqresp,0,1.25.0,,LOW,CWE-703,
|
|
6072
|
+
GHSA-53vx-pmqw-863c,2026-04-17T21:58:15Z,"OpenClaw: Browser SSRF policy default allowed private-network navigation",openclaw,0,2026.4.14,,MODERATE,CWE-1188;CWE-918,
|
|
6073
|
+
GHSA-5478-66c3-rhxr,2026-04-08T21:50:51Z,"Pretext: Algorithmic Complexity (DoS) in the text analysis phase",@chenglou/pretext,0,0.0.5,,HIGH,CWE-407,
|
|
5846
6074
|
GHSA-54qm-37qr-w5wq,2020-09-04T15:04:20Z,"Sandbox Breakout / Arbitrary Code Execution in veval",veval,0.0.0,,,CRITICAL,,
|
|
5847
6075
|
GHSA-54xq-cgqr-rpm3,2023-11-16T17:14:15Z,"sharp vulnerability in libwebp dependency CVE-2023-4863",sharp,0,0.32.6,,HIGH,,
|
|
5848
6076
|
GHSA-553v-f69r-656j,2026-03-03T21:39:10Z,"OpenClaw unpaired device identity can bypass operator pairing and self-assign operator scopes with shared auth",openclaw,2026.2.22,2026.2.25,,MODERATE,CWE-863,
|
|
@@ -5866,19 +6094,30 @@ GHSA-593v-wcqx-hq2w,2021-09-07T22:57:58Z,"Incorrect version tags linked to exter
|
|
|
5866
6094
|
GHSA-593v-wcqx-hq2w,2021-09-07T22:57:58Z,"Incorrect version tags linked to external repository",parse-server,4.6.0,4.10.0,,CRITICAL,,
|
|
5867
6095
|
GHSA-5947-m4fg-xhqg,2020-09-03T18:08:10Z,"Prototype Pollution in lodash.mergewith",lodash.mergewith,0,4.6.1,,HIGH,CWE-1321,
|
|
5868
6096
|
GHSA-59x8-7wx6-4hj9,2020-09-03T17:47:52Z,"Malicious Package in secure_identity_login_module","secure_identity_login_module",0.0.0,,,CRITICAL,CWE-506,
|
|
6097
|
+
GHSA-59xc-5v89-r7pr,2026-04-10T00:30:30Z,"Duplicate Advisory: OpenClaw: Synology Chat Webhook Pre-Auth Rate-Limit Bypass Enables Brute-Force Guessing of Webhook Token",openclaw,0,2026.3.28,,MODERATE,CWE-307,
|
|
6098
|
+
GHSA-59xv-588h-2vmm,2026-04-10T19:30:32Z,"@saltcorn/data vulnerable to SQL Injection via jsexprToSQL Literal Handler",@saltcorn/data,0,1.4.5,,LOW,CWE-89,
|
|
6099
|
+
GHSA-59xv-588h-2vmm,2026-04-10T19:30:32Z,"@saltcorn/data vulnerable to SQL Injection via jsexprToSQL Literal Handler",@saltcorn/data,1.5.0,1.5.5,,LOW,CWE-89,
|
|
6100
|
+
GHSA-59xv-588h-2vmm,2026-04-10T19:30:32Z,"@saltcorn/data vulnerable to SQL Injection via jsexprToSQL Literal Handler",@saltcorn/data,1.6.0-alpha.0,1.6.0-beta.4,,LOW,CWE-89,
|
|
5869
6101
|
GHSA-5c6j-r48x-rmvq,2026-02-28T02:50:45Z,"Serialize JavaScript is Vulnerable to RCE via RegExp.flags and Date.prototype.toISOString()",serialize-javascript,0,7.0.3,,HIGH,CWE-96,
|
|
5870
6102
|
GHSA-5ccf-884p-4jjq,2025-03-20T12:32:51Z,"Open WebUI Unauthenticated Multipart Boundary Denial of Service (DoS) Vulnerability",open-webui,0,,0.3.21,HIGH,CWE-400,
|
|
5871
6103
|
GHSA-5cp4-xmrw-59wf,2020-08-05T21:47:02Z,"XSS via JQLite DOM manipulation functions in AngularJS",angular,0,1.8.0,,MODERATE,CWE-79,
|
|
5872
6104
|
GHSA-5cph-wvm9-45gj,2024-11-21T22:21:03Z,"Flowise OverrideConfig security vulnerability",flowise,0,2.1.4,,HIGH,CWE-15,
|
|
6105
|
+
GHSA-5f7h-p83x-5vc2,2026-04-10T00:30:29Z,"Duplicate Advisory: OpenClaw: Nextcloud Talk room allowlist matched colliding room names instead of stable room tokens",openclaw,0,,,LOW,CWE-807,
|
|
5873
6106
|
GHSA-5f7m-mmpc-qhh4,2019-05-23T09:27:00Z,"mysql Node.JS Module Vulnerable to Remote Memory Exposure",mysql,2.0.0-alpha8,2.14.0,,MODERATE,CWE-201,
|
|
6107
|
+
GHSA-5fc7-f62m-8983,2026-04-09T17:36:29Z,"OpenClaw: Feishu docx upload_file/upload_image Bypasses Workspace-Only Filesystem Policy (GHSA-qf48-qfv4-jjm9 Incomplete Fix)",openclaw,0,2026.4.8,,LOW,CWE-732,
|
|
5874
6108
|
GHSA-5ff8-jcf9-fw62,2020-09-04T17:55:35Z,"Cross-Site Scripting in markdown-it-katex",markdown-it-katex,0.0.0,,,HIGH,CWE-79,
|
|
5875
6109
|
GHSA-5fm9-jmv7-fcx5,2020-09-02T18:35:26Z,"Malicious Package in asynnc",asynnc,0,,,CRITICAL,CWE-506,
|
|
5876
6110
|
GHSA-5fp6-4xw3-xqq3,2023-06-12T18:37:31Z,"@keystone-6/core's bundled cuid package known to be insecure",@keystone-6/core,0,,5.3.1,LOW,,
|
|
6111
|
+
GHSA-5fw2-mwhh-9947,2026-04-17T21:35:14Z,"Flowise: Unauthenticated TTS endpoint accepts arbitrary credential IDs — enables API credit abuse via stored credentials",flowise,0,3.1.0,,HIGH,CWE-639,
|
|
6112
|
+
GHSA-5g3j-89fr-r2vp,2026-04-08T00:07:36Z,"skilleton has improper input handling in repository/path processing",skilleton,0,0.3.1,,MODERATE,"CWE-1333;CWE-400;CWE-78;CWE-88",
|
|
5877
6113
|
GHSA-5g6j-8hv4-vfgj,2020-09-11T21:21:19Z,"Cross-Site Scripting in node-red",node-red,0,0.18.6,,HIGH,CWE-79,
|
|
5878
6114
|
GHSA-5ggx-g294-qj3q,2020-09-03T21:47:29Z,"Malicious Package in buffeb-xor",buffeb-xor,0.0.0,,,CRITICAL,CWE-506,
|
|
6115
|
+
GHSA-5gjc-grvm-m88j,2026-04-17T21:53:17Z,"OpenClaw: Memory dreaming config persistence was reachable from operator.write commands",openclaw,2026.4.5,2026.4.10,,MODERATE,CWE-266;CWE-863,
|
|
5879
6116
|
GHSA-5gqg-mqh5-2v39,2026-03-19T03:30:57Z,"Duplicate Advisory: OpenClaw Windows Scheduled Task script generation allowed local command injection via unsafe cmd argument handling",openclaw,0,2026.2.19,,MODERATE,CWE-78,
|
|
5880
6117
|
GHSA-5h2c-8v84-qpvr,2026-03-03T21:39:51Z,"OpenClaw shell-env fallback trusted startup env and could execute attacker-influenced login-shell paths",openclaw,0,2026.2.22,,MODERATE,CWE-15;CWE-78,
|
|
5881
6118
|
GHSA-5h2w-qmfp-ggp6,2026-03-31T23:57:34Z,"OpenClaw: Gateway `operator.write` can reach admin-only persisted `verboseLevel` via `chat.send` `/verbose`",openclaw,0,2026.3.28,,HIGH,CWE-284;CWE-863,
|
|
6119
|
+
GHSA-5h3f-885m-v22w,2026-04-09T17:36:02Z,"OpenClaw: Existing WS sessions survive shared gateway token rotation",openclaw,0,2026.4.8,,MODERATE,CWE-613,
|
|
6120
|
+
GHSA-5hff-46vh-rxmw,2026-04-07T18:15:37Z,"OpenClaw: Read-scoped identity-bearing HTTP clients could kill sessions via /sessions/:sessionKey/kill",openclaw,0,2026.4.2,,MODERATE,CWE-269,
|
|
5882
6121
|
GHSA-5hx7-77g4-wqx3,2021-02-23T21:30:56Z,"Incorrect Authorization",aedes,0.1.0,0.35.1,,MODERATE,,
|
|
5883
6122
|
GHSA-5j35-xr4g-vwf4,2026-03-25T17:32:39Z,"@grackle-ai/server has a Missing Secure Flag on Session Cookie",@grackle-ai/server,0,0.70.5,,LOW,CWE-614,
|
|
5884
6123
|
GHSA-5j4m-89xf-mf5p,2020-08-27T22:58:46Z,"Missing Origin Validation in parcel-bundler",parcel-bundler,0,1.10.0,,MODERATE,,
|
|
@@ -5896,8 +6135,6 @@ GHSA-5jg4-p4qw-cgfr,2026-04-04T05:33:09Z,"@stablelib/cbor: Stack exhaustion Deni
|
|
|
5896
6135
|
GHSA-5jgp-pg4f-q8vj,2020-09-03T19:55:42Z,"Malicious Package in node-ftp",node-ftp,0.0.0,,,CRITICAL,CWE-506,
|
|
5897
6136
|
GHSA-5jpx-9hw9-2fx4,2025-10-29T10:43:57Z,"NextAuthjs Email misdelivery Vulnerability",next-auth,0,4.24.12,,MODERATE,CWE-200,
|
|
5898
6137
|
GHSA-5jpx-9hw9-2fx4,2025-10-29T10:43:57Z,"NextAuthjs Email misdelivery Vulnerability",next-auth,5.0.0-beta.0,5.0.0-beta.30,,MODERATE,CWE-200,
|
|
5899
|
-
GHSA-5jvj-hxmh-6h6j,2026-03-29T15:46:40Z,"OpenClaw: Gateway HTTP Session History Route Bypasses Operator Read Scope",openclaw,0,,2026.3.24,MODERATE,CWE-639;CWE-863,
|
|
5900
|
-
GHSA-5m9r-p9g7-679c,2026-03-13T20:55:38Z,"OpenClaw: Zalo webhook rate limiting could be bypassed before secret validation",openclaw,0,2026.3.12,,MODERATE,CWE-307,
|
|
5901
6138
|
GHSA-5mm9-55c9-p5r7,2020-09-03T19:53:31Z,"Malicious Package in mogoose",mogoose,0.0.0,,,CRITICAL,CWE-506,
|
|
5902
6139
|
GHSA-5mrr-rgp6-x4gr,2020-09-03T19:39:05Z,"Command Injection in marsdb",marsdb,0.0.0,,,CRITICAL,CWE-77,
|
|
5903
6140
|
GHSA-5p28-63mc-cgr9,2020-12-04T20:04:37Z,"Cross-Site Scripting bypass in html-purify",html-purify,0,,1.1.0,HIGH,CWE-79,
|
|
@@ -5911,9 +6148,11 @@ GHSA-5v72-xg48-5rpm,2019-06-04T19:37:52Z,"Denial of Service in ws",ws,0.2.6,1.1.
|
|
|
5911
6148
|
GHSA-5v72-xg48-5rpm,2019-06-04T19:37:52Z,"Denial of Service in ws",ws,2.0.0,3.3.1,,HIGH,CWE-400,
|
|
5912
6149
|
GHSA-5v7r-jg9r-vq44,2020-09-03T21:19:46Z,"Insecure Cryptography Algorithm in simple-crypto-js",simple-crypto-js,0,2.3.0,,MODERATE,CWE-327,
|
|
5913
6150
|
GHSA-5vj8-3v2h-h38v,2020-09-04T18:04:08Z,"Remote Code Execution in next",next,0.9.9,5.1.0,,HIGH,CWE-20,
|
|
6151
|
+
GHSA-5vjq-5jmg-39xq,2026-04-16T01:34:39Z,"Renovate affected by remote code execution was possible using the bazel-module or bazelisk managers, when using lockFileMaintenance",renovate,43.65.0,43.102.11,,MODERATE,CWE-94,
|
|
5914
6152
|
GHSA-5vm8-hhgr-jcjp,2021-05-28T19:18:53Z,"Cross-site scripting vulnerability in TinyMCE",tinymce,0,5.7.1,,MODERATE,CWE-79,
|
|
5915
6153
|
GHSA-5w25-hxp5-h8c9,2021-06-21T17:12:13Z,"Duplicate Advisory: Improper Verification of Cryptographic Signature",tenvoy,0,7.0.3,,CRITICAL,CWE-347,
|
|
5916
6154
|
GHSA-5w65-6875-rhq8,2019-09-11T23:01:57Z,"Undefined Behavior in sailsjs-cacheman",sailsjs-cacheman,0,,1.0.0,LOW,,
|
|
6155
|
+
GHSA-5wj5-87vq-39xm,2026-04-09T17:35:53Z,"OpenClaw: Node Pairing Reconnect Command Escalation Bypasses operator.admin Scope Requirement",openclaw,0,2026.4.8,,HIGH,CWE-288,
|
|
5917
6156
|
GHSA-5wq6-v5cw-jvfr,2020-09-03T23:03:36Z,"Malicious Package in js-shas",js-shas,0.0.0,,,CRITICAL,CWE-506,
|
|
5918
6157
|
GHSA-5wrg-8fxp-cx9r,2023-06-21T22:06:22Z,"passport-wsfed-saml2 Signature Bypass vulnerability",passport-wsfed-saml2,0,3.0.10,,HIGH,,
|
|
5919
6158
|
GHSA-5x7p-gm79-383m,2020-09-01T21:11:57Z,"Malicious Package in regenraotr",regenraotr,0,,,CRITICAL,CWE-506,
|
|
@@ -5930,7 +6169,6 @@ GHSA-64g7-mvw6-v9qj,2022-01-14T21:09:50Z,"Improper Privilege Management in shell
|
|
|
5930
6169
|
GHSA-657v-jjf8-83gh,2020-09-03T23:14:55Z,"Malicious Package in jsmsha3",jsmsha3,0.0.0,,,CRITICAL,CWE-506,
|
|
5931
6170
|
GHSA-6584-gfwm-3vc3,2020-09-03T21:43:01Z,"Malicious Package in budfer-xor",budfer-xor,0.0.0,,,CRITICAL,CWE-506,
|
|
5932
6171
|
GHSA-659f-22xc-98f2,2026-03-03T23:00:53Z,"OpenClaw hook transform path containment missed symlink-resolved escapes",openclaw,0,2026.2.22,,HIGH,CWE-94,
|
|
5933
|
-
GHSA-65h8-27jh-q8wv,2026-03-26T19:08:34Z,"OpenClaw: Nostr inbound DMs could trigger unauthenticated crypto work before sender policy enforcement",openclaw,0,2026.3.22,,HIGH,CWE-863,
|
|
5934
6172
|
GHSA-65j7-66p7-9xgf,2020-09-02T21:51:55Z,"Malicious Package in font-scrubber",font-scrubber,0,,,CRITICAL,CWE-506,
|
|
5935
6173
|
GHSA-65m9-m259-7jqw,2020-09-03T15:49:29Z,"Improper Authorization in react-oauth-flow",react-oauth-flow,0.0.0,,,CRITICAL,CWE-285,
|
|
5936
6174
|
GHSA-65p7-pjj8-ggmr,2021-09-23T23:18:42Z,"Member account takeover",ghost,3.18.0,3.42.6,,MODERATE,,
|
|
@@ -5941,15 +6179,19 @@ GHSA-66mv-xh68-h6v2,2020-09-03T15:48:53Z,"Denial of Service in @commercial/hapi"
|
|
|
5941
6179
|
GHSA-66mv-xh68-h6v2,2020-09-03T15:48:53Z,"Denial of Service in @commercial/hapi",@commercial/hapi,17.0.0,17.9.2,,HIGH,,
|
|
5942
6180
|
GHSA-66mv-xh68-h6v2,2020-09-03T15:48:53Z,"Denial of Service in @commercial/hapi",@commercial/hapi,18.0.0,18.4.1,,HIGH,,
|
|
5943
6181
|
GHSA-66mv-xh68-h6v2,2020-09-03T15:48:53Z,"Denial of Service in @commercial/hapi",@commercial/hapi,19.0.0,19.1.1,,HIGH,,
|
|
6182
|
+
GHSA-66r7-m7xm-v49h,2026-04-17T22:17:05Z,"OpenClaw: QQBot media tags could read arbitrary local files through reply text",openclaw,0,2026.4.10,,HIGH,CWE-22,
|
|
5944
6183
|
GHSA-674r-xx4c-gj7x,2020-09-03T17:04:05Z,"Malicious Package in sb58",sb58,0.0.0,,,CRITICAL,CWE-506,
|
|
6184
|
+
GHSA-67mf-f936-ppxf,2026-04-09T17:36:33Z,"OpenClaw `node.pair.approve` placed in `operator.write` scope instead of `operator.pairing` allows unprivileged pairing approval",openclaw,0,2026.4.8,,MODERATE,CWE-269,
|
|
5945
6185
|
GHSA-67mh-4wv8-2f99,2025-02-10T17:48:07Z,"esbuild enables any website to send any requests to the development server and read the response",esbuild,0,0.25.0,,MODERATE,CWE-346,
|
|
5946
6186
|
GHSA-67mp-pcv9-vvq6,2020-09-03T22:57:14Z,"Malicious Package in jr-sha3",jr-sha3,0.0.0,,,CRITICAL,CWE-506,
|
|
5947
6187
|
GHSA-6879-xr95-5gf4,2020-09-03T17:20:15Z,"Malicious Package in malicious-do-not-install",malicious-do-not-install,0.0.0,,,CRITICAL,CWE-506,
|
|
5948
6188
|
GHSA-68c2-4mpx-qh95,2024-03-01T16:57:56Z,"Potential leakage of Sentry auth tokens by React Native SDK with Expo plugin",@sentry/react-native,5.16.0,5.19.1,,LOW,CWE-200,
|
|
5949
|
-
GHSA-68f8-9mhj-h2mp,2026-03-30T18:41:15Z,"OpenClaw has a Gateway HTTP /v1/models Route Bypasses Operator Read Scope",openclaw,0,2026.3.24,,MODERATE,CWE-284;CWE-863,
|
|
5950
6189
|
GHSA-68gr-cmcp-g3mj,2019-06-14T16:39:31Z,"Directory Traversal in lactate",lactate,0,,0.13.12,HIGH,CWE-22,
|
|
5951
6190
|
GHSA-68jh-rf6x-836f,2023-06-16T19:40:53Z,"@apollo/server vulnerable to unsafe application of Content Security Policy via reused nonces",@apollo/server,4.7.1,4.7.4,,LOW,,
|
|
6191
|
+
GHSA-68qg-g8mg-6pr7,2026-04-10T21:08:57Z,"paperclip Vulnerable to Unauthenticated Remote Code Execution via Import Authorization Bypass",@paperclipai/server,0,2026.410.0,,CRITICAL,CWE-1188;CWE-287;CWE-862,
|
|
6192
|
+
GHSA-68qg-g8mg-6pr7,2026-04-10T21:08:57Z,"paperclip Vulnerable to Unauthenticated Remote Code Execution via Import Authorization Bypass",paperclipai,0,2026.410.0,,CRITICAL,CWE-1188;CWE-287;CWE-862,
|
|
5952
6193
|
GHSA-68v4-hmwv-f43h,2026-04-03T02:49:40Z,"OpenClaw: Media download follows cross-origin redirects with Authorization headers intact",openclaw,0,2026.3.31,,MODERATE,CWE-522,
|
|
6194
|
+
GHSA-68x5-xx89-w9mm,2026-04-09T17:34:27Z,"OpenClaw: resolvedAuth closure becomes stale after config reload",openclaw,0,2026.4.8,,MODERATE,CWE-613,
|
|
5953
6195
|
GHSA-692h-g37c-qv44,2020-09-03T23:25:30Z,"Malicious Package in sj-tw-sec",sj-tw-sec,0.0.0,,,CRITICAL,CWE-506,
|
|
5954
6196
|
GHSA-6933-jpx5-q87q,2025-09-15T20:30:30Z,"Flowise has unsandboxed remote code execution via Custom MCP",flowise,2.2.7-patch.1,3.0.6,,HIGH,CWE-78;CWE-862,
|
|
5955
6197
|
GHSA-69mf-2cw2-38m8,2020-09-03T23:04:40Z,"Malicious Package in js-shc3",js-shc3,0.0.0,,,CRITICAL,CWE-506,
|
|
@@ -5960,6 +6202,7 @@ GHSA-6chw-6frg-f759,2020-04-03T21:48:38Z,"Regular Expression Denial of Service i
|
|
|
5960
6202
|
GHSA-6chw-6frg-f759,2020-04-03T21:48:38Z,"Regular Expression Denial of Service in Acorn",acorn,6.0.0,6.4.1,,HIGH,CWE-400,
|
|
5961
6203
|
GHSA-6chw-6frg-f759,2020-04-03T21:48:38Z,"Regular Expression Denial of Service in Acorn",acorn,7.0.0,7.1.1,,HIGH,CWE-400,
|
|
5962
6204
|
GHSA-6cj2-92m5-7mvp,2021-08-03T16:48:46Z,"Improperly Controlled Modification of Object Prototype Attributes",think-config,0,1.1.3,,HIGH,CWE-1321,
|
|
6205
|
+
GHSA-6f7g-v4pp-r667,2026-04-16T21:52:46Z,"Flowise: Unauthenticated OAuth 2.0 Access Token Disclosure via Public Chatflow in Flowise",flowise,0,3.1.0,,HIGH,CWE-306,
|
|
5963
6206
|
GHSA-6f93-xj8r-jp82,2020-09-03T22:28:21Z,"Malicious Package in bunfer-xor",bunfer-xor,0.0.0,,,CRITICAL,CWE-506,
|
|
5964
6207
|
GHSA-6fcr-9h9g-23fq,2020-09-02T21:50:51Z,"Denial of Service in ipfs-bitswap",ipfs-bitswap,0,0.24.1,,MODERATE,CWE-400,
|
|
5965
6208
|
GHSA-6fh5-8wq8-w3wr,2020-09-04T15:09:55Z,"Prototype Pollution in unflatten",unflatten,0.0.0,,,HIGH,CWE-1321,
|
|
@@ -5968,17 +6211,21 @@ GHSA-6jg8-7333-554w,2019-10-04T17:56:12Z,"Sandbox Breakout in realms-shim",realm
|
|
|
5968
6211
|
GHSA-6jg8-7333-554w,2019-10-04T17:56:12Z,"Sandbox Breakout in realms-shim",ses,0,0.6.3,,CRITICAL,,
|
|
5969
6212
|
GHSA-6jrj-vc65-c983,2024-08-26T15:17:40Z,"unzip-stream allows Arbitrary File Write via artifact extraction",unzip-stream,0,0.3.2,,HIGH,CWE-22,
|
|
5970
6213
|
GHSA-6m6m-j2hm-pxrg,2020-09-03T17:37:05Z,"Malicious Package in cicada-render",cicada-render,0.0.0,,,CRITICAL,CWE-506,
|
|
5971
|
-
GHSA-6mqc-jqh6-x8fc,2026-03-26T18:59:00Z,"OpenClaw: Gateway Canvas local-direct requests bypass Canvas HTTP and WebSocket authentication",openclaw,0,2026.3.23,,MODERATE,CWE-287,
|
|
5972
6214
|
GHSA-6mrq-7r7m-hh4p,2020-09-03T22:52:58Z,"Malicious Package in hs-sha3",hs-sha3,0.0.0,,,CRITICAL,CWE-506,
|
|
5973
6215
|
GHSA-6p8r-6m93-557f,2026-04-03T03:09:18Z,"OpenClaw: Fake DeviceToken Bypasses Shared Auth Rate Limiting",openclaw,0,2026.3.31,,MODERATE,CWE-307,
|
|
6216
|
+
GHSA-6pcv-j4jx-m4vx,2026-04-16T21:20:05Z,"Flowise: Unauthenticated Information Disclosure of OAuth Secrets (Cleartext) via GET Request",flowise,0,3.1.0,,MODERATE,CWE-306;CWE-312,
|
|
5974
6217
|
GHSA-6pfc-6m7w-m8fx,2026-03-31T23:59:53Z,"OpenClaw has a gateway exec allowlist allow-always bypass via unregistered /usr/bin/script wrapper",openclaw,0,2026.3.28,,HIGH,CWE-385,
|
|
5975
6218
|
GHSA-6q22-g298-grjh,2026-04-04T06:13:25Z,"Directus: Unauthenticated Denial of Service via GraphQL Alias Amplification of Expensive Health Check Resolver",directus,0,11.17.0,,HIGH,CWE-400;CWE-770,
|
|
6219
|
+
GHSA-6q2v-vfwp-pvwh,2026-03-29T15:30:20Z,"Duplicate Advisory: OpenClaw's skills-install-download can be redirected outside the tools root by rebinding the validated base path",openclaw,0,2026.3.8,,MODERATE,CWE-367,
|
|
5976
6220
|
GHSA-6qc7-jgq7-34rf,2020-09-02T20:18:18Z,"Malicious Package in exprss",exprss,0,,,CRITICAL,CWE-506,
|
|
5977
6221
|
GHSA-6qgx-f452-7699,2020-09-03T23:28:39Z,"Malicious Package in superhappyfuntime",superhappyfuntime,0.0.0,,,CRITICAL,CWE-506,
|
|
5978
6222
|
GHSA-6qqf-vvcr-7qrv,2019-05-23T09:27:22Z,"Cryptographically Weak PRNG in generate-password",generate-password,0,1.4.1,,MODERATE,CWE-338,
|
|
5979
6223
|
GHSA-6qqj-rx4w-r3cj,2020-08-31T22:48:44Z,"CSRF Vulnerability in jquery-ujs",jquery-ujs,0,1.0.4,,MODERATE,CWE-352,
|
|
5980
6224
|
GHSA-6r5x-hmgg-7h53,2019-07-15T19:46:01Z,"Remote code execution in Handlebars.js",handlebars,0,4.1.0,,MODERATE,,
|
|
6225
|
+
GHSA-6r77-hqx7-7vw8,2026-04-16T21:52:11Z,"Flowise: APIChain Prompt Injection SSRF in GET/POST API Chains",flowise,0,3.1.0,,HIGH,CWE-918,
|
|
6226
|
+
GHSA-6r77-hqx7-7vw8,2026-04-16T21:52:11Z,"Flowise: APIChain Prompt Injection SSRF in GET/POST API Chains",flowise-components,0,3.1.0,,HIGH,CWE-918,
|
|
5981
6227
|
GHSA-6rmx-gvvg-vh6j,2026-03-09T19:52:47Z,"OpenClaw's hooks count non-POST requests toward auth lockout",openclaw,0,2026.3.7,,MODERATE,CWE-307;CWE-799,
|
|
6228
|
+
GHSA-6v7q-wjvx-w8wg,2026-04-10T20:18:23Z,"basic-ftp: Incomplete CRLF Injection Protection Allows Arbitrary FTP Command Execution via Credentials and MKD Commands",basic-ftp,0,5.2.2,,HIGH,CWE-93,
|
|
5982
6229
|
GHSA-6x2m-hqfw-hvpj,2026-03-02T22:29:45Z,"OpenClaw: Node exec approvals could be replayed across nodes",openclaw,0,2026.2.23,,MODERATE,CWE-285;CWE-863,
|
|
5983
6230
|
GHSA-6x33-pw7p-hmpq,2020-09-04T17:59:49Z,"Denial of Service in http-proxy",http-proxy,0,1.18.1,,HIGH,CWE-184;CWE-693,
|
|
5984
6231
|
GHSA-6xg2-cf6h-x4v8,2020-09-03T21:53:05Z,"Malicious Package in buffer-por",buffer-por,0.0.0,,,CRITICAL,CWE-506,
|
|
@@ -5989,25 +6236,27 @@ GHSA-724c-6vrf-99rq,2020-09-02T21:49:48Z,"Sensitive Data Exposure in loopback",l
|
|
|
5989
6236
|
GHSA-725f-3pw7-rq6x,2020-09-03T21:09:47Z,"Malicious Package in 8.9.4",8.9.4,0.0.0,,,CRITICAL,CWE-506,
|
|
5990
6237
|
GHSA-72gr-qfp7-vwhw,2026-03-20T20:50:09Z,"h3: Double Decoding in `serveStatic` Bypasses `resolveDotSegments` Path Traversal Protection via `%252e%252e`",h3,0,1.15.9,,MODERATE,CWE-22,
|
|
5991
6238
|
GHSA-733v-p3h5-qpq7,2025-04-25T15:14:36Z,"GraphQL Armor Cost-Limit Plugin Bypass via Introspection Query Obfuscation","@escape.tech/graphql-armor-cost-limit",0,2.4.2,,MODERATE,CWE-400;CWE-770,
|
|
6239
|
+
GHSA-736r-jwj6-4w23,2026-04-17T22:14:56Z,"OpenClaw: Sandboxed agents could escape exec routing via host=node override",openclaw,2026.4.5,2026.4.10,,HIGH,CWE-863,
|
|
5992
6240
|
GHSA-73c6-vwjh-g3qh,2020-09-03T19:40:46Z,"Malicious Package in crpyto-js",crpyto-js,0.0.0,,,CRITICAL,CWE-506,
|
|
5993
6241
|
GHSA-73cw-jxmm-qpgh,2019-06-11T16:40:48Z,"Path Traversal in localhost-now",localhost-now,0,,1.0.2,HIGH,CWE-22,
|
|
5994
6242
|
GHSA-73hr-6785-f5p8,2020-09-02T21:24:55Z,"Malicious Package in donotinstallthis",donotinstallthis,0,,,CRITICAL,CWE-506,
|
|
5995
6243
|
GHSA-73v8-v6g4-vrpm,2020-09-02T15:58:13Z,"Arbitrary File Overwrite in decompress-zip",decompress-zip,0,0.2.2,,HIGH,,
|
|
5996
6244
|
GHSA-73v8-v6g4-vrpm,2020-09-02T15:58:13Z,"Arbitrary File Overwrite in decompress-zip",decompress-zip,0.3.0,0.3.2,,HIGH,,
|
|
5997
6245
|
GHSA-73wv-v82c-xmqv,2020-09-03T21:50:51Z,"Malicious Package in buffep-xor",buffep-xor,0.0.0,,,CRITICAL,CWE-506,
|
|
6246
|
+
GHSA-7437-7hg8-frrw,2026-04-09T14:22:29Z,"OpenClaw: HGRCPATH, CARGO_BUILD_RUSTC_WRAPPER, RUSTC_WRAPPER, and MAKEFLAGS missing from exec env denylist — RCE via build tool env injection (GHSA-cm8v-2vh9-cxf3 class)",openclaw,0,2026.4.8,,HIGH,CWE-184;CWE-78,
|
|
5998
6247
|
GHSA-74cp-qw7f-7hpw,2019-06-05T14:10:23Z,"Path Traversal in statics-server",statics-server,0,,0.0.9,MODERATE,CWE-22,
|
|
5999
6248
|
GHSA-74cr-77xc-8g6r,2019-06-13T20:37:39Z,"Prototype Pollution in @apollo/gateway",@apollo/gateway,0,0.6.2,,HIGH,CWE-1321;CWE-400,
|
|
6000
6249
|
GHSA-74hh-4rcv-pp27,2020-09-04T16:44:19Z,"Malicious Package in bitconijs-lib",bitconijs-lib,0.0.0,,,CRITICAL,CWE-506,
|
|
6001
|
-
GHSA-74wf-h43j-vvmj,2026-03-26T21:46:42Z,"OpenClaw's Conflicting Tool Identity Hints Bypass Dangerous-Tool Prompting",openclaw,0,2026.3.22,,HIGH,CWE-807;CWE-863,
|
|
6002
6250
|
GHSA-7543-mr7h-6v86,2020-09-02T16:00:26Z,"Improper Authorization in googleapis",googleapis,0,39.1.0,,HIGH,CWE-285,
|
|
6251
|
+
GHSA-75hx-xj24-mqrw,2026-04-10T20:59:58Z,"n8n-mcp has unauthenticated session termination and information disclosure in HTTP transport",n8n-mcp,0,2.47.6,,HIGH,CWE-306,
|
|
6003
6252
|
GHSA-762c-v946-pf25,2020-09-04T16:47:33Z,"Malicious Package in bpi39",bpi39,0.0.0,,,CRITICAL,CWE-506,
|
|
6004
6253
|
GHSA-766v-7gjx-55hf,2020-09-03T23:08:34Z,"Malicious Package in js-shq3",js-shq3,0.0.0,,,CRITICAL,CWE-506,
|
|
6254
|
+
GHSA-767m-xrhc-fxm7,2026-04-07T18:11:15Z,"OpenClaw: Gateway operator.write Can Reach Admin-Class Telegram Config and Cron Persistence via send",openclaw,0,2026.3.28,,LOW,CWE-269,
|
|
6005
6255
|
GHSA-7696-qr5q-pg37,2020-09-03T23:19:08Z,"Malicious Package in zs-sha3",zs-sha3,0.0.0,,,CRITICAL,CWE-506,
|
|
6006
6256
|
GHSA-76qf-6mvw-c5hm,2020-09-03T19:45:42Z,"Malicious Package in js-base64-int",js-base64-int,0.0.0,,,CRITICAL,CWE-506,
|
|
6007
6257
|
GHSA-76xq-58hj-vwm2,2020-09-11T21:16:59Z,"Malicious Package in test-module-a",test-module-a,0,,,CRITICAL,CWE-506,
|
|
6008
6258
|
GHSA-779f-wgxg-qr8f,2020-09-03T18:10:22Z,"Prototype Pollution in lodash.mergewith",lodash.mergewith,0,4.6.2,,HIGH,CWE-1321,
|
|
6009
6259
|
GHSA-77hf-7fqf-f227,2026-03-03T21:32:35Z,"OpenClaw skills-install-download: tar.bz2 extraction bypassed archive safety parity checks (local DoS)",openclaw,0,2026.3.2,,MODERATE,CWE-400;CWE-409,
|
|
6010
|
-
GHSA-77w2-crqv-cmv3,2026-03-29T15:49:17Z,"OpenClaw: Feishu Raw Card Send Surface Can Mint Legacy Card Callbacks That Bypass DM Pairing",openclaw,0,2026.3.28,,MODERATE,CWE-288;CWE-863,
|
|
6011
6260
|
GHSA-785g-gx74-gr39,2020-09-03T23:12:48Z,"Malicious Package in js-wha3",js-wha3,0.0.0,,,CRITICAL,CWE-506,
|
|
6012
6261
|
GHSA-788m-pj96-7w2c,2020-09-02T21:23:51Z,"Cross-Site Scripting in fomantic-ui",fomantic-ui,0,2.7.0,,HIGH,CWE-79,
|
|
6013
6262
|
GHSA-78p3-fwcq-62c2,2024-10-03T19:50:59Z,"@saltcorn/server Remote Code Execution (RCE) / SQL injection via prototype pollution by manipulating `lang` and `defstring` parameters when setting localizer strings",@saltcorn/server,0,1.0.0-beta.14,,HIGH,CWE-1321,
|
|
@@ -6027,12 +6276,14 @@ GHSA-7fhm-mqm4-2wp7,2020-03-13T20:36:16Z,"Withdrawn: ESLint dependencies are vul
|
|
|
6027
6276
|
GHSA-7fpw-cfc4-3p2c,2017-12-28T22:51:45Z,"Duplicate advisory: High severity vulnerability that affects passport-wsfed-saml2",passport-wsfed-saml2,0,3.0.5,,HIGH,CWE-290,
|
|
6028
6277
|
GHSA-7fqq-q52p-2jjg,2026-03-29T15:27:41Z,"OpenCC has an Out-of-bounds read when processing truncated UTF-8 input",opencc,0,1.2.0,,MODERATE,CWE-125,
|
|
6029
6278
|
GHSA-7frr-c83r-fm22,2020-09-03T22:20:49Z,"Malicious Package in buffez-xor",buffez-xor,0.0.0,,,CRITICAL,CWE-506,
|
|
6279
|
+
GHSA-7g8c-cfr3-vqqr,2026-04-17T21:55:20Z,"OpenClaw: Agent hook events could enqueue trusted system events from unsanitized external input",openclaw,0,2026.4.10,,MODERATE,CWE-269,
|
|
6030
6280
|
GHSA-7ggg-pvrf-458v,2026-04-02T20:57:44Z,"OpenClaw: PIP_INDEX_URL and UV_INDEX_URL bypass host exec env sanitization and redirect Python package-index traffic",openclaw,0,2026.3.31,,HIGH,CWE-807,
|
|
6031
6281
|
GHSA-7h7g-x2px-94hj,2026-03-13T20:54:18Z,"OpenClaw: Pairing setup codes exposed long-lived shared gateway credentials instead of short-lived bootstrap tokens",openclaw,0,2026.3.12,,MODERATE,CWE-532,
|
|
6032
6282
|
GHSA-7hx8-2rxv-66xv,2020-09-03T15:48:00Z,"Denial of Service in hapi",hapi,0.0.0,,,HIGH,,
|
|
6033
6283
|
GHSA-7j52-6fjp-58gr,2022-03-14T23:22:27Z,"Inconsistent storage layout for ERC2771ContextUpgradeable","@openzeppelin/contracts-upgradeable",4.0.0,4.3.0,,LOW,,
|
|
6034
6284
|
GHSA-7j93-5m2h-rvjx,2020-09-04T15:32:46Z,"Malicious Package in bconi",bconi,0.0.0,,,CRITICAL,CWE-506,
|
|
6035
6285
|
GHSA-7jfh-2xc9-ccv7,2019-05-31T23:46:40Z,"Cross-Site Scripting in public",public,0,0.1.4,,LOW,CWE-79,
|
|
6286
|
+
GHSA-7jp6-r74r-995q,2026-04-17T22:15:27Z,"OpenClaw: Matrix profile config persistence was reachable from operator.write message tools",openclaw,0,2026.4.10,,HIGH,CWE-266;CWE-863,
|
|
6036
6287
|
GHSA-7m7q-q53v-j47v,2021-02-25T02:01:47Z,"Regular Expression Denial of Service",marked,0.5.0,0.6.1,,MODERATE,,
|
|
6037
6288
|
GHSA-7p6w-x2gr-rrf8,2020-09-02T21:28:05Z,"ag-grid Cross-Site Scripting vulnerability",ag-grid,0,14.0.0,,HIGH,CWE-79,
|
|
6038
6289
|
GHSA-7q64-3rg2-h9pf,2026-02-27T18:31:06Z,"Duplicate Advisory: Nest has a Fastify URL Encoding Middleware Bypass",@nestjs/platform-fastify,0,11.1.14,,HIGH,CWE-863,
|
|
@@ -6047,6 +6298,7 @@ GHSA-7v28-g2pq-ggg8,2022-06-17T01:16:03Z,"Ghost vulnerable to remote code execut
|
|
|
6047
6298
|
GHSA-7v28-g2pq-ggg8,2022-06-17T01:16:03Z,"Ghost vulnerable to remote code execution in locale setting change",ghost,5.0.0,5.2.3,,MODERATE,,
|
|
6048
6299
|
GHSA-7w7c-867m-4mqc,2020-09-03T17:04:55Z,"Malicious Package in rceat",rceat,0.0.0,,,CRITICAL,CWE-506,
|
|
6049
6300
|
GHSA-7wgh-5q4q-6wx5,2020-09-04T17:30:39Z,"Malicious Package in 1337qq-js",1337qq-js,0.0.0,,,CRITICAL,CWE-506,
|
|
6301
|
+
GHSA-7wv4-cc7p-jhxc,2026-04-17T21:56:12Z,"OpenClaw: Workspace .env could inject OpenClaw runtime-control variables",openclaw,0,2026.4.9,,MODERATE,CWE-15,
|
|
6050
6302
|
GHSA-7wwv-vh3v-89cq,2020-12-04T16:47:20Z,"ReDOS vulnerabities: multiple grammars",@highlightjs/cdn-assets,0,10.4.1,,MODERATE,CWE-20;CWE-400,
|
|
6051
6303
|
GHSA-7wwv-vh3v-89cq,2020-12-04T16:47:20Z,"ReDOS vulnerabities: multiple grammars",highlight.js,9.0.0,10.4.1,,MODERATE,CWE-20;CWE-400,
|
|
6052
6304
|
GHSA-7x92-2j68-h32c,2020-09-01T19:03:02Z,"Directory Traversal in featurebook",featurebook,0,,,MODERATE,CWE-22,
|
|
@@ -6057,14 +6309,16 @@ GHSA-7xf6-cpxm-5mx9,2020-09-03T22:27:18Z,"Malicious Package in bufner-xor",bufne
|
|
|
6057
6309
|
GHSA-7xf9-74cp-8hx3,2020-09-03T22:59:21Z,"Malicious Package in js-cha3",js-cha3,0.0.0,,,CRITICAL,CWE-506,
|
|
6058
6310
|
GHSA-7xfq-xh6v-4mrm,2020-09-01T20:27:53Z,"Malicious Package in json-serializer",json-serializer,2.0.10,2.0.11,,CRITICAL,CWE-506,
|
|
6059
6311
|
GHSA-7xmq-g46g-f8pv,2026-03-02T21:55:47Z,"OpenClaw: Sandbox media TOCTOU could read files outside sandbox root",openclaw,0,2026.3.1,,HIGH,CWE-367;CWE-59,
|
|
6060
|
-
GHSA-7xr2-q9vf-x4r5,2026-03-26T21:49:25Z,"OpenClaw: Symlink Traversal via IDENTITY.md appendFile in agents.create/update (Incomplete Fix for CVE-2026-32013)",openclaw,0,,2026.2.22,HIGH,CWE-61,
|
|
6061
6312
|
GHSA-82gw-wqw6-r2cf,2026-03-19T03:30:57Z,"Duplicate Advisory: Command Injection via unescaped environment assignments in Windows Scheduled Task script generation",openclaw,0,,2026.2.17,MODERATE,CWE-78,
|
|
6062
6313
|
GHSA-82jv-9wjw-pqh6,2024-04-17T22:26:37Z,"Prototype pollution in emit function",derby,0,2.3.2,,LOW,CWE-1321,
|
|
6063
6314
|
GHSA-82jv-9wjw-pqh6,2024-04-17T22:26:37Z,"Prototype pollution in emit function",derby,3.0.0,3.0.2,,LOW,CWE-1321,
|
|
6064
6315
|
GHSA-82jv-9wjw-pqh6,2024-04-17T22:26:37Z,"Prototype pollution in emit function",derby,4.0.0-beta1,4.0.0-beta.11,,LOW,CWE-1321,
|
|
6316
|
+
GHSA-82qx-6vj7-p8m2,2026-04-17T21:58:46Z,"OpenClaw: Channel setup catalog lookups could include untrusted workspace plugin shadows",openclaw,0,2026.4.10,,HIGH,CWE-862,
|
|
6317
|
+
GHSA-8372-7vhw-cm6q,2026-04-17T21:47:15Z,"OpenClaw: config.get redaction bypass through sourceConfig and runtimeConfig aliases",openclaw,0,2026.4.14,,HIGH,CWE-212,
|
|
6318
|
+
GHSA-83f3-hh45-vfw9,2026-04-07T18:16:06Z,"OpenClaw: Android accepted cleartext remote gateway endpoints and sent stored credentials over ws://",openclaw,0,2026.4.2,,MODERATE,CWE-200,
|
|
6065
6319
|
GHSA-83pq-466j-fc6j,2020-09-04T15:17:50Z,"Prototype Pollution in sahmat",sahmat,0.0.0,,,HIGH,CWE-1321,
|
|
6066
6320
|
GHSA-83rx-c8cr-6j8q,2019-06-05T20:48:55Z,"Insecure Default Configuration in tesseract.js",tesseract.js,0,1.0.19,,MODERATE,CWE-829,
|
|
6067
|
-
GHSA-
|
|
6321
|
+
GHSA-846p-hgpv-vphc,2026-04-07T18:15:00Z,"OpenClaw: QQ Bot structured payloads could read arbitrary local files",openclaw,0,2026.4.2,,MODERATE,CWE-22,
|
|
6068
6322
|
GHSA-84c3-j8r2-mcm8,2024-02-26T20:10:10Z,"@nfid/embed has compromised private key due to @dfinity/auth-client producing insecure session keys",@nfid/embed,0.10.0,0.10.1-alpha.6,,CRITICAL,CWE-321;CWE-330,
|
|
6069
6323
|
GHSA-84jw-g43v-8gjm,2024-09-19T17:30:05Z,"DOM Clobbering Gadget found in Rspack's AutoPublicPathRuntimeModule that leads to XSS",@rspack/core,0,1.0.0-rc.1,,MODERATE,CWE-79,
|
|
6070
6324
|
GHSA-84p7-fh9c-6g8h,2021-09-20T19:52:24Z,"Prototype Pollution in mixme",mixme,0,0.5.2,,HIGH,CWE-1321,
|
|
@@ -6081,13 +6335,13 @@ GHSA-86mr-6m89-vgj3,2020-09-03T15:51:38Z,"Buffer Overflow in node-weakauras-pars
|
|
|
6081
6335
|
GHSA-86p3-4gfq-38f2,2019-06-05T14:10:34Z,"Denial of Service in url-relative",url-relative,0,,1.0.0,MODERATE,CWE-400,
|
|
6082
6336
|
GHSA-876r-hj45-fw7g,2020-09-03T21:18:41Z,"Sandbox Breakout / Arbitrary Code Execution in safer-eval",safer-eval,0.0.0,,,CRITICAL,,
|
|
6083
6337
|
GHSA-877v-w3f5-3pcq,2026-04-02T20:59:49Z,"OpenClaw: Feishu thread history and quoted messages bypass sender allowlist",openclaw,0,2026.3.31,,MODERATE,CWE-863,
|
|
6338
|
+
GHSA-8783-3wgf-jggf,2026-04-16T22:40:59Z,"Budibase: Authentication Bypass via Unanchored Regex in Public Endpoint Matcher — Unauthenticated Access to Protected Endpoints",@budibase/backend-core,0,,3.35.3,CRITICAL,CWE-287,
|
|
6084
6339
|
GHSA-8796-gc9j-63rv,2021-05-17T20:51:16Z,"File upload local preview can run embedded scripts after user interaction",matrix-react-sdk,0,3.21.0,,MODERATE,CWE-74,
|
|
6085
6340
|
GHSA-87mg-h5r3-hw88,2019-05-30T17:23:28Z,"Cross-Site Scripting in bootbox",bootbox,0,,5.5.2,MODERATE,CWE-64;CWE-79,
|
|
6086
6341
|
GHSA-87qp-7cw8-8q9c,2024-03-25T06:30:24Z,"Duplicate Advisory: web3-utils Prototype Pollution vulnerability",web3-utils,0,4.2.1,,HIGH,CWE-1321,
|
|
6087
6342
|
GHSA-87qw-7v97-w34r,2020-09-02T18:33:18Z,"Malicious Package in asinc",asinc,0,,,CRITICAL,CWE-506,
|
|
6088
6343
|
GHSA-87v3-4cfp-cm76,2026-03-18T16:10:26Z,"Cross-Site Scripting (XSS) via SVG Schema innerHTML Injection in @pdfme/schemas",@pdfme/schemas,0,5.5.9,,MODERATE,CWE-79,
|
|
6089
6344
|
GHSA-886v-mm6p-4m66,2019-06-05T09:48:02Z,"High severity vulnerability that affects gun",gun,0,0.2019.416,,HIGH,CWE-22,
|
|
6090
|
-
GHSA-8883-9w57-vwv6,2026-03-26T21:23:04Z,"OpenClaw: Mattermost callback dispatch allowed non-allowlisted sender actions",openclaw,0,2026.3.22,,MODERATE,CWE-285;CWE-863,
|
|
6091
6345
|
GHSA-88h9-fc6v-jcw7,2020-09-03T20:28:51Z,"Unintended Require in larvitbase-www",larvitbase-www,0.0.0,,,MODERATE,,
|
|
6092
6346
|
GHSA-88qp-p4qg-rqm6,2026-02-19T20:30:25Z,"CPU exhaustion in SvelteKit remote form deserialization (experimental only)",@sveltejs/kit,2.49.0,2.52.2,,MODERATE,CWE-843,
|
|
6093
6347
|
GHSA-88xx-23mf-rcj2,2020-09-03T22:51:52Z,"Malicious Package in bs-sha3",bs-sha3,0.0.0,,,CRITICAL,CWE-506,
|
|
@@ -6099,15 +6353,16 @@ GHSA-89v5-38xr-9m4j,2026-03-27T15:47:57Z,"Postiz has Multiple SSRF Vectors - Web
|
|
|
6099
6353
|
GHSA-8c8c-4vfj-rrpc,2020-09-01T19:05:11Z,"Reflected Cross-Site Scripting in redis-commander",redis-commander,0.0.0,0.5.0,,LOW,CWE-79,
|
|
6100
6354
|
GHSA-8cp7-rp8r-mg77,2026-03-04T18:55:48Z,"OpenClaw has SSRF guard bypass via IPv6 transition over ISATAP",openclaw,2026.1.20,2026.2.19,,MODERATE,CWE-918,
|
|
6101
6355
|
GHSA-8f93-rv4p-x4jw,2019-06-12T16:36:52Z,"SQL Injection in sql",sql,0,,0.78.0,MODERATE,CWE-89,
|
|
6356
|
+
GHSA-8f9r-gr6r-x63q,2026-04-10T00:30:30Z,"Duplicate Advisory: OpenClaw: Feishu webhook reads and parses unauthenticated request bodies before signature validation",openclaw,0,2026.3.28,,MODERATE,CWE-696,
|
|
6102
6357
|
GHSA-8fw4-xh83-3j6q,2020-09-11T21:18:05Z,"Cross-Site Scripting in diagram-js",diagram-js,0,2.6.2,,MODERATE,CWE-79,
|
|
6103
6358
|
GHSA-8fw4-xh83-3j6q,2020-09-11T21:18:05Z,"Cross-Site Scripting in diagram-js",diagram-js,3.0.0,3.3.1,,MODERATE,CWE-79,
|
|
6104
6359
|
GHSA-8g29-8xwr-qmhr,2026-03-25T17:33:01Z,"@grackle-ai/server JSON.parse lacks try-catch logic in its gRPC Service AdapterConfig Handling",@grackle-ai/server,0,0.70.6,,LOW,CWE-754,
|
|
6105
6360
|
GHSA-8g3r-968r-c644,2020-09-03T23:15:58Z,"Malicious Package in jw-sha3",jw-sha3,0.0.0,,,CRITICAL,CWE-506,
|
|
6106
6361
|
GHSA-8g64-9cm2-838j,2020-09-03T22:29:26Z,"Malicious Package in bugfer-xor",bugfer-xor,0.0.0,,,CRITICAL,CWE-506,
|
|
6107
|
-
GHSA-8g75-q649-6pv6,2026-03-12T14:21:28Z,"OpenClaw's system.run approvals did not bind mutable script operands across approval and execution",openclaw,0,2026.3.8,,MODERATE,CWE-285;CWE-367,
|
|
6108
6362
|
GHSA-8g98-m4j9-qww5,2025-06-18T17:51:03Z,"Taylored webhook validation vulnerabilities",taylored,7.0.5,7.0.8,,CRITICAL,"CWE-22;CWE-294;CWE-345;CWE-916",
|
|
6109
6363
|
GHSA-8gc6-65mm-xr6r,2020-09-04T16:46:28Z,"Malicious Package in bp66",bp66,0.0.0,,,CRITICAL,CWE-506,
|
|
6110
6364
|
GHSA-8h3q-9fpp-c883,2026-01-21T00:31:43Z,"Duplicate Advisory: Wrangler affected by OS Command Injection in `wrangler pages deploy`",wrangler,2.0.15,,,HIGH,CWE-20,
|
|
6365
|
+
GHSA-8h8f-7cxm-m38j,2026-04-02T21:32:52Z,"Duplicate Advisory: OpenClaw: Windows media loaders accepted remote-host file URLs before local path validation",openclaw,0,2026.3.22,,MODERATE,CWE-184,
|
|
6111
6366
|
GHSA-8h8v-6qqm-fwpq,2020-09-01T21:06:38Z,"Path Traversal in express-cart",express-cart,0,1.1.7,,HIGH,CWE-22,
|
|
6112
6367
|
GHSA-8hmr-w35f-3qgj,2020-09-03T21:07:37Z,"Malicious Package in harmlesspackage",harmlesspackage,0.0.0,,,CRITICAL,CWE-506,
|
|
6113
6368
|
GHSA-8hq2-fcqm-39hq,2020-09-02T21:46:05Z,"Malicious Package in rimrafall",rimrafall,0,,,CRITICAL,CWE-506,
|
|
@@ -6116,6 +6371,7 @@ GHSA-8hrq-9wm7-v3jw,2020-09-03T21:39:41Z,"Malicious Package in btffer-xor",btffe
|
|
|
6116
6371
|
GHSA-8j49-49jq-vwcq,2020-09-04T15:15:34Z,"Prototype Pollution in getsetdeep",getsetdeep,0.0.0,,,HIGH,CWE-1321,
|
|
6117
6372
|
GHSA-8j6j-4h2c-c65p,2020-09-03T17:02:52Z,"Arbitrary Code Execution in require-node",require-node,0,1.3.4,,CRITICAL,CWE-78,
|
|
6118
6373
|
GHSA-8j6j-4h2c-c65p,2020-09-03T17:02:52Z,"Arbitrary Code Execution in require-node",require-node,2.0.0,2.0.4,,CRITICAL,CWE-78,
|
|
6374
|
+
GHSA-8j7f-g9gv-7jhc,2026-04-10T00:30:30Z,"Duplicate Advisory: OpenClaw: SSRF via Unguarded Configured Base URLs in Multiple Channel Extensions (Incomplete Fix for CVE-2026-28476)",openclaw,0,2026.3.28,,MODERATE,CWE-918,
|
|
6119
6375
|
GHSA-8j7x-pr59-m5h8,2020-09-02T21:31:18Z,"Malicious Package in whiteproject",whiteproject,0,,,CRITICAL,CWE-506,
|
|
6120
6376
|
GHSA-8j8c-7jfh-h6hx,2019-06-04T20:14:07Z,"Code Injection in js-yaml",js-yaml,0,3.13.1,,HIGH,CWE-94,
|
|
6121
6377
|
GHSA-8jf2-cq6v-w234,2020-09-03T21:10:53Z,"Malicious Package in uglyfi.js",uglyfi.js,0.0.0,,,CRITICAL,CWE-506,
|
|
@@ -6161,32 +6417,33 @@ GHSA-8xqr-4cpm-wx7g,2019-05-31T23:47:27Z,"Cross-Site Scripting in react-svg",rea
|
|
|
6161
6417
|
GHSA-9272-59x2-gwf2,2020-09-03T17:04:13Z,"Malicious Package in ripedm160",ripedm160,0.0.0,,,CRITICAL,CWE-506,
|
|
6162
6418
|
GHSA-9298-m7jf-55h2,2020-09-04T16:42:08Z,"Malicious Package in bitconid-rpc",bitconid-rpc,0.0.0,,,CRITICAL,CWE-506,
|
|
6163
6419
|
GHSA-929m-phjg-qwcc,2025-04-01T21:31:30Z,"Duplicate Advisory: MathLive's Lack of Escaping of HTML allows for XSS",mathlive,0,0.104.0,,MODERATE,CWE-79,
|
|
6420
|
+
GHSA-92jp-89mq-4374,2026-04-17T20:08:01Z,"OpenClaw: Sandbox noVNC helper route exposed interactive browser session credentials",openclaw,2026.2.21,2026.4.10,,MODERATE,CWE-306,
|
|
6421
|
+
GHSA-939r-rj45-g2rj,2026-04-17T22:12:49Z,"OpenClaw: Workspace provider auth choices could auto-enable untrusted provider plugins",openclaw,0,2026.4.9,,HIGH,CWE-829,
|
|
6164
6422
|
GHSA-943q-mwmv-hhvh,2026-03-02T23:32:22Z,"OpenClaw: Gateway /tools/invoke tool escalation + ACP permission auto-approval",openclaw,0,2026.2.14,,HIGH,CWE-78,
|
|
6165
|
-
GHSA-94pw-c6m8-p9p9,2026-03-30T18:52:38Z,"OpenClaw: Gateway operator.write Can Reach Admin-Class Channel Allowlist Persistence via chat.send",openclaw,0,2026.3.24,,HIGH,CWE-269,
|
|
6166
|
-
GHSA-9528-x887-j2fp,2026-03-31T23:59:17Z,"OpenClaw's Nextcloud Talk webhook missing rate limiting on shared secret authentication",openclaw,0,2026.3.28,,MODERATE,CWE-307,
|
|
6167
6423
|
GHSA-95cg-3r4g-7w6j,2020-09-03T23:01:29Z,"Malicious Package in js-rha3",js-rha3,0.0.0,,,CRITICAL,CWE-506,
|
|
6168
6424
|
GHSA-96qw-h329-v5rg,2026-01-08T21:13:37Z,"Shakapacker has environment variable leak via EnvironmentPlugin that exposes secrets to client-side bundles",shakapacker,0,9.5.0,,HIGH,CWE-200,
|
|
6169
6425
|
GHSA-97mg-3cr6-3x4c,2020-09-04T17:27:23Z,"Remote Code Execution in mongodb-query-parser",mongodb-query-parser,0,2.0.0,,CRITICAL,,
|
|
6170
6426
|
GHSA-97mp-9g5c-6c93,2020-09-04T16:50:48Z,"Malicious Package in bs58chcek",bs58chcek,0.0.0,,,CRITICAL,CWE-506,
|
|
6171
6427
|
GHSA-984p-xq9m-4rjw,2019-06-07T21:01:53Z,"Rate Limiting Bypass in express-brute",express-brute,0,,1.0.1,MODERATE,CWE-77,
|
|
6428
|
+
GHSA-98ch-45wp-ch47,2026-04-07T18:15:48Z,"OpenClaw: Windows-compatible env override keys could bypass system.run approval binding",openclaw,0,2026.4.2,,MODERATE,CWE-178,
|
|
6172
6429
|
GHSA-98hh-7ghg-x6rq,2026-03-31T23:52:38Z,"OpenClaw: Discord text `/approve` bypasses `channels.discord.execApprovals.approvers` and allows non-approvers to resolve pending exec approvals",openclaw,0,2026.3.28,,HIGH,CWE-863,
|
|
6173
6430
|
GHSA-98pf-gfh3-x3mp,2022-11-10T16:02:51Z,"Read the Docs vulnerable to Cross-Site Scripting (XSS)",readthedocs,0,8.8.1,,MODERATE,CWE-79,
|
|
6174
6431
|
GHSA-992f-wf4w-x36v,2020-09-01T21:16:13Z,"Prototype Pollution in merge-objects",merge-objects,0.0.0,,,LOW,CWE-1321,
|
|
6175
6432
|
GHSA-9959-c6q6-6qp3,2017-10-24T18:33:36Z,"Moderate severity vulnerability that affects validator",validator,0,2.0.0,,MODERATE,,
|
|
6176
6433
|
GHSA-99pg-hqvx-r4gf,2025-09-15T20:00:39Z,"Flowise has an Arbitrary File Read",flowise,3.0.5,3.0.6,,CRITICAL,,
|
|
6177
|
-
GHSA-99qw-6mr3-36qr,2026-03-13T20:55:13Z,"OpenClaw: Workspace plugin auto-discovery allowed code execution from cloned repositories",openclaw,0,2026.3.12,,HIGH,CWE-829,
|
|
6178
6434
|
GHSA-9c4c-g95m-c8cp,2025-04-07T18:55:13Z,"FlowiseDB vulnerable to SQL Injection by authenticated users",flowise,0,,2.2.7,MODERATE,CWE-564,
|
|
6179
6435
|
GHSA-9cph-cqqh-36pw,2020-09-04T15:29:25Z,"Malicious Package in babel-loqder",babel-loqder,0.0.0,,,CRITICAL,CWE-506,
|
|
6180
6436
|
GHSA-9f4w-67g7-mqwv,2026-04-03T03:26:14Z,"OpenClaw: Endpoint persists after trust decline, leaking gateway credentials",openclaw,0,2026.3.31,,MODERATE,CWE-670,
|
|
6181
6437
|
GHSA-9f72-qcpw-2hxc,2026-03-03T19:08:08Z,"OpenClaw: Native prompt image auto-load did not honor tools.fs.workspaceOnly in sandboxed runs",openclaw,0,2026.2.24,,HIGH,CWE-200;CWE-284,
|
|
6182
6438
|
GHSA-9f79-7pw8-3fj8,2026-03-21T03:31:14Z,"Duplicate Advisory: OpenClaw: workspace path guard bypass on non-existent out-of-root symlink leaf",openclaw,0,,2026.2.25,HIGH,CWE-22,
|
|
6183
6439
|
GHSA-9gp8-hjxr-6f34,2026-04-03T02:57:00Z,"OpenClaw: Host exec environment overrides miss proxy, TLS, Docker, and Git TLS controls",openclaw,0,2026.3.31,,MODERATE,CWE-269,
|
|
6440
|
+
GHSA-9gvx-vj57-vqqx,2026-04-10T00:30:30Z,"Duplicate Advisory: OpenClaw: Gateway Canvas local-direct requests bypass Canvas HTTP and WebSocket authentication",openclaw,0,2026.3.23,,MODERATE,CWE-288,
|
|
6184
6441
|
GHSA-9gxr-rhx6-4jgv,2020-09-04T15:18:57Z,"Sandbox Breakout / Prototype Pollution in notevil",notevil,0,1.3.3,,MODERATE,CWE-1321,
|
|
6185
6442
|
GHSA-9h6g-pr28-7cqp,2024-01-31T22:42:54Z,"nodemailer ReDoS when trying to send a specially crafted email",nodemailer,0,6.9.9,,MODERATE,CWE-1333,
|
|
6186
6443
|
GHSA-9hc2-w9gg-q6jw,2020-09-01T21:07:41Z,"Malicious Package in boogeyman",boogeyman,0.0.0,,,CRITICAL,CWE-506,
|
|
6187
|
-
GHSA-9hjh-fr4f-gxc4,2026-03-27T22:29:12Z,"OpenClaw: Gateway Backend Reconnect lets Non-Admin Operator Scopes Self-Claim operator.admin",openclaw,0,,2026.3.24,CRITICAL,CWE-269;CWE-863,
|
|
6188
6444
|
GHSA-9hqj-38j2-5jgm,2020-09-01T21:19:23Z,"Command Injection in ascii-art",ascii-art,0,1.4.4,,LOW,CWE-77,
|
|
6189
|
-
GHSA-
|
|
6445
|
+
GHSA-9hrv-gvrv-6gf2,2026-04-16T21:23:17Z,"Flowise Execute Flow function has an SSRF vulnerability",flowise,0,3.1.0,,MODERATE,CWE-918,
|
|
6446
|
+
GHSA-9hrv-gvrv-6gf2,2026-04-16T21:23:17Z,"Flowise Execute Flow function has an SSRF vulnerability",flowise-components,0,3.1.0,,MODERATE,CWE-918,
|
|
6190
6447
|
GHSA-9mjp-gv34-3jcf,2020-09-02T18:37:35Z,"Malicious Package in aasync",aasync,0,,,CRITICAL,CWE-506,
|
|
6191
6448
|
GHSA-9mmw-3fmh-96g3,2020-09-02T20:23:38Z,"Malicious Package in calk",calk,0,,,CRITICAL,CWE-506,
|
|
6192
6449
|
GHSA-9mph-4f7v-fmvh,2026-03-04T19:02:59Z,"OpenClaw has agent avatar symlink traversal in gateway session metadata",openclaw,0,2026.2.22,,MODERATE,CWE-59,
|
|
@@ -6204,6 +6461,7 @@ GHSA-9q64-mpxx-87fg,2020-04-01T16:35:08Z,"Open Redirect in ecstatic",ecstatic,4.
|
|
|
6204
6461
|
GHSA-9q7v-8mr7-g23p,2026-04-02T21:22:56Z,"OpenClaw: SSRF via Unguarded `fetch()` in Marketplace Plugin Download and Ollama Model Discovery",openclaw,0,2026.3.31,,MODERATE,CWE-918,
|
|
6205
6462
|
GHSA-9q82-xgwf-vj6h,2026-03-26T21:53:10Z,"Apollo Server: Browser bug allows for bypass of XS-Search (read-only Cross-Site Request Forgery) prevention",@apollo/server,0,5.5.0,,MODERATE,CWE-200,
|
|
6206
6463
|
GHSA-9q82-xgwf-vj6h,2026-03-26T21:53:10Z,"Apollo Server: Browser bug allows for bypass of XS-Search (read-only Cross-Site Request Forgery) prevention",apollo-server-core,0,,3.13.0,MODERATE,CWE-200,
|
|
6464
|
+
GHSA-9q8j-chc7-wpgp,2026-03-29T15:30:20Z,"Duplicate Advisory: OpenClaw session transcript files were created without forced user-only permissions",openclaw,0,2026.2.17,,MODERATE,CWE-378,
|
|
6207
6465
|
GHSA-9q9m-m2f6-jr5q,2020-09-02T20:22:34Z,"Malicious Package in chak",chak,0,,,CRITICAL,CWE-506,
|
|
6208
6466
|
GHSA-9qgh-7pgp-hp7r,2020-09-03T17:10:31Z,"Cross-Site Scripting in graylog-web-interface",graylog-web-interface,0.0.0,,,HIGH,CWE-79,
|
|
6209
6467
|
GHSA-9qr9-h5gf-34mp,2025-12-03T19:07:11Z,"Next.js is vulnerable to RCE in React flight protocol",next,14.3.0-canary.77,15.0.5,,CRITICAL,CWE-502,
|
|
@@ -6227,8 +6485,9 @@ GHSA-9vrw-m88g-w75q,2020-09-03T15:45:53Z,"Denial of Service in @hapi/accept",@ha
|
|
|
6227
6485
|
GHSA-9vrw-m88g-w75q,2020-09-03T15:45:53Z,"Denial of Service in @hapi/accept",@hapi/accept,4.0.0,5.0.1,,HIGH,,
|
|
6228
6486
|
GHSA-9vvh-2768-c8vp,2026-03-13T18:58:20Z,"OpenClaw: Discord guild reaction ingress could bypass users and roles allowlists",openclaw,0,2026.3.11,,MODERATE,CWE-284;CWE-863,
|
|
6229
6487
|
GHSA-9w87-4j72-gcv7,2020-09-02T18:27:54Z,"Insecure Default Configuration in graphql-code-generator",graphql-code-generator,0,0.18.2,,HIGH,,
|
|
6488
|
+
GHSA-9wc7-mj3f-74xv,2026-04-16T21:44:15Z,"Flowise: Code Injection in CSVAgent leads to Authenticated RCE",flowise,0,3.1.0,,CRITICAL,CWE-94,
|
|
6489
|
+
GHSA-9wc7-mj3f-74xv,2026-04-16T21:44:15Z,"Flowise: Code Injection in CSVAgent leads to Authenticated RCE",flowise-components,0,3.1.0,,CRITICAL,CWE-94,
|
|
6230
6490
|
GHSA-9wjh-jr2j-6r4x,2020-09-02T15:55:58Z,"Remote Code Execution in pi_video_recording",pi_video_recording,0,,,HIGH,CWE-20,
|
|
6231
|
-
GHSA-9wqx-g2cw-vc7r,2026-03-27T22:31:48Z,"OpenClaw: Matrix Verification Notices Bypass Matrix DM Policy and Reply to Unpaired DM Peers",openclaw,0,,2026.3.24,MODERATE,CWE-288;CWE-863,
|
|
6232
6491
|
GHSA-9wx7-jrvc-28mm,2021-11-08T21:51:18Z,"Signature verification vulnerability in Stark Bank ecdsa libraries",starkbank-ecdsa,1.1.2,1.1.3,,HIGH,CWE-347,
|
|
6233
6492
|
GHSA-9x4v-xfq5-m8x5,2025-02-05T21:49:39Z,"Better Auth URL parameter HTML Injection (Reflected Cross-Site scripting)",better-auth,0.0.2,1.1.16,,MODERATE,CWE-79,
|
|
6234
6493
|
GHSA-9xgp-hfw7-73rq,2020-08-19T21:30:04Z,"Authentication Weakness in keystone",keystone,0,0.3.16,,MODERATE,,
|
|
@@ -6244,6 +6503,7 @@ GHSA-c3px-v9c7-m734,2020-09-03T19:04:39Z,"Prototype Pollution in mithril",mithri
|
|
|
6244
6503
|
GHSA-c447-w54g-f55j,2026-03-29T15:30:19Z,"Duplicate Advisory: OpenClaw Telegram webhook request bodies were read before secret validation, enabling unauthenticated resource exhaustion",openclaw,0,,2026.3.12,HIGH,CWE-770,
|
|
6245
6504
|
GHSA-c4fm-46gm-4469,2020-09-03T20:00:05Z,"Malicious Package in sparkies",sparkies,0.0.0,,,CRITICAL,CWE-506,
|
|
6246
6505
|
GHSA-c4hh-fg8x-6h9p,2020-09-03T21:57:29Z,"Malicious Package in buffer-xnr",buffer-xnr,0.0.0,,,CRITICAL,CWE-506,
|
|
6506
|
+
GHSA-c4qm-58hj-j6pj,2026-04-17T21:47:36Z,"OpenClaw: Browser snapshot and screenshot routes could expose internal page content after navigation",openclaw,0,2026.4.14,,MODERATE,CWE-918,
|
|
6247
6507
|
GHSA-c53x-wwx2-pg96,2020-09-03T17:03:58Z,"Cross-Site Scripting in @berslucas/liljs",@berslucas/liljs,0,1.0.2,,MODERATE,CWE-79,
|
|
6248
6508
|
GHSA-c5j4-vw9m-xc95,2020-08-27T22:44:08Z,"Open Redirect in hekto",hekto,0,0.2.4,,LOW,,
|
|
6249
6509
|
GHSA-c5xm-m64m-f2vq,2020-09-04T15:23:47Z,"Malicious Package in cxct",cxct,0.0.0,,,CRITICAL,CWE-506,
|
|
@@ -6253,22 +6513,24 @@ GHSA-c6m7-q6pr-c64r,2025-12-12T16:41:58Z,"Vite Plugin React has a Source Code Ex
|
|
|
6253
6513
|
GHSA-c7pp-x73h-4m2v,2020-09-02T15:53:46Z,"Cross-Site Scripting in bootstrap-vue",bootstrap-vue,0,2.0.0-rc.12,,HIGH,CWE-79,
|
|
6254
6514
|
GHSA-c7w3-x93f-qmm8,2026-03-26T22:26:46Z,"Nodemailer has SMTP command injection due to unsanitized `envelope.size` parameter",nodemailer,0,8.0.4,,LOW,CWE-93,
|
|
6255
6515
|
GHSA-c8m8-3jcr-6rj5,2026-03-07T02:31:18Z,"FUXA has a hardcoded fallback JWT signing secret",@frangoteam/fuxa,0,1.3.0,,HIGH,CWE-321,
|
|
6516
|
+
GHSA-c9h3-5p7r-mrjh,2026-04-17T21:56:04Z,"OpenClaw: Discord event cover images bypassed sandbox media normalization",openclaw,2026.4.7,2026.4.10,,MODERATE,CWE-22,
|
|
6517
|
+
GHSA-cc4f-hjpj-g9p8,2026-04-16T21:21:12Z,"Flowise: Weak Default JWT Secrets",flowise,0,3.1.0,,MODERATE,CWE-327,
|
|
6256
6518
|
GHSA-ccgf-5rwj-j3hv,2026-04-02T23:21:23Z,"TeleJSON: DOM XSS via unsanitised constructor name in `new Function()`",telejson,0,6.0.0,,LOW,CWE-79,
|
|
6257
6519
|
GHSA-ccq6-3qx5-vmqx,2018-07-31T22:54:14Z,"Moderate severity vulnerability that affects is-my-json-valid",is-my-json-valid,0,2.12.4,,MODERATE,,
|
|
6258
6520
|
GHSA-ccrp-c664-8p4j,2020-09-03T21:17:36Z,"Cross-Site Scripting in markdown-to-jsx",markdown-to-jsx,0,6.11.4,,HIGH,CWE-79,
|
|
6521
|
+
GHSA-ccx3-fw7q-rr2r,2026-04-09T17:37:20Z,"OpenClaw: Multiple Code Paths Missing Base64 Pre-Allocation Size Checks",openclaw,0,2026.4.8,,MODERATE,CWE-770,
|
|
6259
6522
|
GHSA-cfc5-x58f-869w,2020-09-03T19:40:55Z,"Malicious Package in conistring",conistring,0.0.0,,,CRITICAL,CWE-506,
|
|
6260
6523
|
GHSA-cff4-rrq6-h78w,2019-06-03T17:31:26Z,"Command Injection in command-exists",command-exists,0,1.2.4,,CRITICAL,CWE-77,
|
|
6261
|
-
GHSA-cfp9-w5v9-3q4h,2026-03-26T21:48:06Z,"OpenClaw: Image Tool `tools.fs.workspaceOnly` Bypass via Sandbox Bridge Mounts",openclaw,0,2026.3.2,,MODERATE,CWE-863,
|
|
6262
6524
|
GHSA-cfqx-f43m-vfh7,2024-10-03T19:46:42Z,"@saltcorn/server arbitrary file and directory listing when accessing build mobile app results",@saltcorn/server,0,1.0.0-beta.14,,MODERATE,CWE-548,
|
|
6263
6525
|
GHSA-cfwc-xjfp-44jg,2020-09-04T17:19:48Z,"Command Injection in gnuplot",gnuplot,0.0.0,,,CRITICAL,CWE-77,
|
|
6264
6526
|
GHSA-cfxh-frx4-9gjg,2023-12-15T03:13:18Z,"Cross-site Scripting in @spscommerce/ds-react",@spscommerce/ds-react,4.12.2,7.17.4,,CRITICAL,CWE-79,
|
|
6265
6527
|
GHSA-cg48-9hh2-x6mx,2020-09-02T18:28:58Z,"HTML Injection in preact",preact,10.0.0-alpha.0,10.0.0-beta.1,,MODERATE,CWE-74,
|
|
6266
|
-
GHSA-cg6c-q2hx-69h7,2026-03-26T18:56:32Z,"OpenClaw: Plivo V2 verified replay identity drifts on query-only variants",openclaw,0,2026.3.23,,HIGH,CWE-294,
|
|
6267
6528
|
GHSA-cg7q-fg22-4g98,2026-04-03T03:07:13Z,"OpenClaw: Host exec environment sanitization misses package, registry, Docker, compiler, and TLS override variables",openclaw,0,2026.3.31,,MODERATE,CWE-184,
|
|
6268
6529
|
GHSA-cgjv-rghq-qhgp,2019-09-11T23:00:57Z,"Path Traversal in algo-httpserv",algo-httpserv,0,1.1.2,,HIGH,CWE-22,
|
|
6269
6530
|
GHSA-cgvm-rvfv-c92r,2020-09-03T17:05:51Z,"Malicious Package in ecuvre",ecuvre,0.0.0,,,CRITICAL,CWE-506,
|
|
6270
6531
|
GHSA-ch52-vgq2-943f,2020-09-03T18:15:53Z,"Regular Expression Denial of Service in marked",marked,0.4.0,0.7.0,,LOW,CWE-1333,
|
|
6271
6532
|
GHSA-ch82-gqh6-9xj9,2020-09-04T15:13:19Z,"Prototype Pollution in get-setter",get-setter,0.0.0,,,HIGH,CWE-1321,
|
|
6533
|
+
GHSA-ch86-pxr9-j9h9,2026-04-03T21:31:43Z,"Duplicate Advisory: OpenClaw: Gemini OAuth exposed the PKCE verifier through the OAuth state parameter",openclaw,0,2026.4.2,,MODERATE,CWE-330,
|
|
6272
6534
|
GHSA-chfm-xgc4-47rj,2026-04-02T21:01:28Z,"OpenClaw: MSTeams thread history bypasses sender allowlist via Graph API",openclaw,0,2026.3.31,,LOW,CWE-863,
|
|
6273
6535
|
GHSA-chgg-rrmv-5q7x,2020-08-03T18:05:48Z,Withdrawn,jwt-simple,0,0.3.1,,MODERATE,,
|
|
6274
6536
|
GHSA-chh2-rvhg-wqwr,2020-09-03T21:02:10Z,"Malicious Package in json-serializer",json-serializer,2.0.10,2.0.11,,CRITICAL,,
|
|
@@ -6278,6 +6540,8 @@ GHSA-cj63-jhhr-wcxv,2026-04-03T03:45:08Z,"DOMPurify USE_PROFILES prototype pollu
|
|
|
6278
6540
|
GHSA-cjmm-f4jc-qw8r,2026-04-03T03:46:07Z,"DOMPurify ADD_ATTR predicate skips URI validation",dompurify,0,3.3.2,,MODERATE,CWE-183,
|
|
6279
6541
|
GHSA-cjq8-m7wj-xmq9,2026-03-21T03:31:14Z,"Duplicate Advisory: OpenClaw Node system.run approval context-binding weakness in approval-enabled host=node flows",openclaw,0,,,LOW,CWE-863,
|
|
6280
6542
|
GHSA-cjv3-m589-v3rx,2026-03-03T23:17:06Z,"OpenClaw has Canvas route hardening for mixed-trust deployments",openclaw,0,2026.2.21,,MODERATE,CWE-1021;CWE-79,
|
|
6543
|
+
GHSA-cm8v-2vh9-cxf3,2026-04-09T20:28:32Z,"OpenClaw: GIT_DIR and related git plumbing env vars missing from exec env denylist (GHSA-m866-6qv5-p2fg variant)",openclaw,0,2026.4.8,,LOW,CWE-184;CWE-78,
|
|
6544
|
+
GHSA-cmfr-9m2r-xwhq,2026-04-09T17:34:21Z,"OpenClaw `node.invoke(browser.proxy)` bypasses `browser.request` persistent profile-mutation guard",openclaw,0,2026.4.8,,MODERATE,CWE-863,
|
|
6281
6545
|
GHSA-cp47-r258-q626,2023-03-02T23:36:22Z," Vega vulnerable to arbitrary code execution when clicking href links",vega,0,4.5.1,,MODERATE,,
|
|
6282
6546
|
GHSA-cp47-r258-q626,2023-03-02T23:36:22Z," Vega vulnerable to arbitrary code execution when clicking href links",vega,5.0.0,5.4.1,,MODERATE,,
|
|
6283
6547
|
GHSA-cpgr-wmr9-qxv4,2020-09-11T21:20:14Z,"Cross-Site Scripting in serve",serve,0,10.0.2,,MODERATE,CWE-79,
|
|
@@ -6297,13 +6561,22 @@ GHSA-crr2-ph72-c52g,2020-09-03T17:27:22Z,"Malicious Package in my-very-own-packa
|
|
|
6297
6561
|
GHSA-crvj-3gj9-gm2p,2018-10-09T00:44:29Z,"High severity vulnerability that affects qs",qs,0,1.0.0,,HIGH,,
|
|
6298
6562
|
GHSA-cv3v-7846-6pxm,2020-09-03T21:15:19Z,"Unauthorized File Access in node-git-server",node-git-server,0,0.6.1,,HIGH,CWE-552,
|
|
6299
6563
|
GHSA-cvfm-xjc8-f2vm,2020-09-03T15:46:36Z,"Denial of Service in @commercial/subtext",@commercial/subtext,5.1.1,5.1.2,,HIGH,,
|
|
6564
|
+
GHSA-cvrr-qhgw-2mm6,2026-04-16T21:46:39Z,"Flowise: Parameter Override Bypass Remote Command Execution",flowise,0,3.1.0,,HIGH,CWE-20,
|
|
6565
|
+
GHSA-cvrr-qhgw-2mm6,2026-04-16T21:46:39Z,"Flowise: Parameter Override Bypass Remote Command Execution",flowise-components,0,3.1.0,,HIGH,CWE-20,
|
|
6300
6566
|
GHSA-cwf8-44x6-32c2,2026-04-03T02:49:14Z,"OpenClaw: OpenShell Mirror Sync — Sandbox Escape via Unrestricted File Sync + Symlink Traversal",openclaw,0,2026.3.31,,HIGH,CWE-434;CWE-59,
|
|
6301
6567
|
GHSA-cwq8-6f96-g3q4,2026-04-02T21:24:03Z,"OpenClaw: Security Scan Failure Does Not Block Plugin Installation (Fail-Open)",openclaw,0,2026.3.31,,LOW,CWE-636;CWE-754,
|
|
6302
6568
|
GHSA-cx7r-634m-2q2h,2020-09-02T18:20:21Z,"Cross-Site Scripting in harp",harp,0,,,MODERATE,,
|
|
6303
6569
|
GHSA-cxcw-jm67-3wwp,2026-03-21T03:31:14Z,"Duplicate Advisory: OpenClaw's andbox browser noVNC observer lacked VNC authentication",openclaw,0,,,HIGH,CWE-306,
|
|
6304
|
-
GHSA-
|
|
6570
|
+
GHSA-cxfr-3qp8-hpmw,2026-03-31T12:31:36Z,"Duplicate Advisory: OpenClaw: Zalo webhook rate limiting could be bypassed before secret validation",openclaw,0,2026.3.12,,MODERATE,CWE-307,
|
|
6571
|
+
GHSA-f228-chmx-v6j6,2026-04-16T21:43:57Z,"Flowise: Remote code execution vulnerability in AirtableAgent.ts caused by lack of input verification when using `Pandas`.",flowise,0,3.1.0,,HIGH,CWE-94,
|
|
6572
|
+
GHSA-f228-chmx-v6j6,2026-04-16T21:43:57Z,"Flowise: Remote code execution vulnerability in AirtableAgent.ts caused by lack of input verification when using `Pandas`.",flowise-components,0,3.1.0,,HIGH,CWE-94,
|
|
6573
|
+
GHSA-f275-5h5c-5wg5,2026-03-31T15:31:56Z,"Duplicate Advisory: OpenClaw: /pair approve command path omitted caller scope subsetting and reopened device pairing escalation",openclaw,0,2026.3.28,,HIGH,CWE-863,
|
|
6305
6574
|
GHSA-f294-27fc-wgj7,2020-09-03T22:16:31Z,"Malicious Package in buffer-zor",buffer-zor,0.0.0,,,CRITICAL,CWE-506,
|
|
6306
6575
|
GHSA-f3f2-mcxc-pwjx,2026-02-26T15:56:31Z,"n8n: SQL Injection in MySQL, PostgreSQL, and Microsoft SQL nodes",n8n,0,2.4.0,,MODERATE,CWE-89,
|
|
6576
|
+
GHSA-f3g8-9xv5-77gv,2026-04-16T23:00:45Z,"Saltcorn: Open Redirect in `POST /auth/login` due to incomplete `is_relative_url` validation (backslash bypass)",@saltcorn/server,0,1.4.6,,MODERATE,CWE-601,
|
|
6577
|
+
GHSA-f3g8-9xv5-77gv,2026-04-16T23:00:45Z,"Saltcorn: Open Redirect in `POST /auth/login` due to incomplete `is_relative_url` validation (backslash bypass)",@saltcorn/server,1.5.0-beta.0,1.5.6,,MODERATE,CWE-601,
|
|
6578
|
+
GHSA-f3g8-9xv5-77gv,2026-04-16T23:00:45Z,"Saltcorn: Open Redirect in `POST /auth/login` due to incomplete `is_relative_url` validation (backslash bypass)",@saltcorn/server,1.6.0-alpha.0,1.6.0-beta.5,,MODERATE,CWE-601,
|
|
6579
|
+
GHSA-f3h5-h452-vp3j,2026-04-17T22:00:59Z,"OpenClaw: Nostr profile mutation routes allowed operator.write config persistence",openclaw,0,2026.4.10,,MODERATE,CWE-266;CWE-863,
|
|
6307
6580
|
GHSA-f3pc-c2gf-hvgw,2020-09-02T21:13:14Z,"Malicious Package in requets",requets,0,,,CRITICAL,CWE-506,
|
|
6308
6581
|
GHSA-f3vw-587g-r29g,2020-09-03T15:50:38Z,"Path Traversal in sapper",sapper,0,0.27.11,,CRITICAL,CWE-22,
|
|
6309
6582
|
GHSA-f44p-c7w9-7xr7,2026-03-31T23:54:00Z,"OpenClaw: Gateway WebSocket Denial of Service via unbounded pre-auth upgrades",openclaw,0,2026.3.28,,MODERATE,CWE-400;CWE-770,
|
|
@@ -6316,8 +6589,10 @@ GHSA-f693-58pc-2gfr,2026-04-03T03:20:58Z,"OpenClaw: Telegram legacy allowFrom mi
|
|
|
6316
6589
|
GHSA-f698-m2v9-5fh3,2019-06-04T20:11:44Z,"Command Injection in opencv",opencv,0,6.1.0,,LOW,CWE-77,
|
|
6317
6590
|
GHSA-f6gj-7592-5jxm,2021-02-23T21:33:53Z,"Directory Traversal",node-simple-router,0,0.10.1,,HIGH,,
|
|
6318
6591
|
GHSA-f6h3-846h-2r8w,2026-03-04T18:58:07Z,"OpenClaw's elevated allowFrom accepted broader identity signals than specified within sender-scoped authorization",openclaw,0,2026.2.22,,MODERATE,CWE-639,
|
|
6592
|
+
GHSA-f6hc-c5jr-878p,2026-04-16T21:55:18Z,"Flowise: resetPassword Authentication Bypass Vulnerability",flowise,0,3.1.0,,HIGH,CWE-287,
|
|
6319
6593
|
GHSA-f6pf-4gjx-c94r,2026-04-03T03:05:07Z,"OpenClaw: Media Parsing Path Traversal Leads to Arbitrary File Read",openclaw,0,2026.3.28,,HIGH,CWE-22,
|
|
6320
6594
|
GHSA-f72h-wf57-7xwh,2020-09-03T21:58:34Z,"Malicious Package in buffer-xo2",buffer-xo2,0.0.0,,,CRITICAL,CWE-506,
|
|
6595
|
+
GHSA-f7fh-qg34-x2xh,2026-04-17T22:18:28Z,"OpenClaw: CDP /json/version WebSocket URL could pivot to untrusted second-hop targets",openclaw,0,2026.4.5,,MODERATE,CWE-918,
|
|
6321
6596
|
GHSA-f7g4-fm4c-54m9,2020-09-03T21:06:31Z,"Malicious Package in yeoman-genrator",yeoman-genrator,0.0.0,,,CRITICAL,CWE-506,
|
|
6322
6597
|
GHSA-f7gc-6hcj-wc42,2020-09-03T17:05:06Z,"Malicious Package in path-to-regxep",path-to-regxep,0.0.0,,,CRITICAL,CWE-506,
|
|
6323
6598
|
GHSA-f7qw-5pvg-mmwp,2019-06-13T18:58:44Z,"Prototype Pollution in lutils-merge",lutils-merge,0,,0.2.6,MODERATE,CWE-400,
|
|
@@ -6329,11 +6604,13 @@ GHSA-f8pq-3926-8gx5,2023-08-09T20:59:14Z,"Unsanitized user controlled input in m
|
|
|
6329
6604
|
GHSA-f8r2-vg7x-gh8m,2026-03-13T20:55:03Z,"OpenClaw: Exec approval allowlist patterns overmatched on POSIX paths",openclaw,0,2026.3.11,,MODERATE,CWE-178;CWE-625,
|
|
6330
6605
|
GHSA-f8rq-m28h-8hxj,2020-09-03T15:50:29Z,"Cross-Site Scripting in htmr",htmr,0,0.8.7,,HIGH,CWE-79,
|
|
6331
6606
|
GHSA-f8vf-6hwg-hw55,2020-09-04T15:38:21Z,"Malicious Package in bictore-lib",bictore-lib,0.0.0,,,CRITICAL,CWE-506,
|
|
6607
|
+
GHSA-f934-5rqf-xx47,2026-04-17T22:33:33Z,"OpenClaw: QMD memory_get restricts reads to canonical or indexed memory paths",openclaw,0,2026.4.15,,MODERATE,CWE-22,
|
|
6332
6608
|
GHSA-ff5x-w9wg-h275,2020-03-06T01:15:46Z,"Holder can generate proof of ownership for credentials it does not control in vp-toolkit",vp-toolkit,0,0.2.2,,HIGH,,
|
|
6333
6609
|
GHSA-ff6g-gm92-rf32,2020-09-03T19:42:06Z,"Malicious Package in coinstirng",coinstirng,0.0.0,,,CRITICAL,CWE-506,
|
|
6334
6610
|
GHSA-ff98-w8hj-qrxf,2026-03-03T21:39:26Z,"OpenClaw plugin runtime command execution is part of trusted plugin boundary",openclaw,0,2026.2.19,,MODERATE,CWE-78,
|
|
6335
6611
|
GHSA-ffr4-mrhv-vfr2,2026-03-21T03:31:14Z,"Duplicate Advisory: OpenClaw has browser trace/download path symlink escape in temp output handling",openclaw,0,,,MODERATE,CWE-59,
|
|
6336
6612
|
GHSA-fgp6-8g62-qx6w,2020-09-03T17:01:45Z,"Malicious Package in smartsearchwp",smartsearchwp,0,,,CRITICAL,CWE-506,
|
|
6613
|
+
GHSA-fh32-73r9-rgh5,2026-04-07T18:15:56Z,"OpenClaw: Trailing-dot localhost CDP hosts could bypass remote loopback protections",openclaw,0,2026.4.2,,MODERATE,CWE-20,
|
|
6337
6614
|
GHSA-fj93-7wm4-8x2g,2020-09-02T21:22:47Z,"Cross-Site Scripting in jquery-mobile",jquery-mobile,0,,,HIGH,CWE-79,
|
|
6338
6615
|
GHSA-fjh6-8679-9pch,2025-11-14T20:57:31Z,"Flowise does not Prevent Bypass of Password Confirmation - Unverified Password Change",flowise-ui,0,3.0.10,,HIGH,CWE-306;CWE-620,
|
|
6339
6616
|
GHSA-fm4j-4xhm-xpwx,2020-09-02T15:51:34Z,"Sandbox Breakout / Arbitrary Code Execution in sandbox",sandbox,0.0.0,,,MODERATE,,
|
|
@@ -6347,6 +6624,8 @@ GHSA-fpf2-pr3j-4cm3,2020-09-03T17:06:06Z,"Malicious Package in ecruve",ecruve,0.
|
|
|
6347
6624
|
GHSA-fpg4-jhqr-589c,2026-02-28T02:04:39Z,"SvelteKit has deserialization expansion in unvalidated `form` remote function leading to Denial of Service (experimental only)",@sveltejs/kit,2.49.0,2.53.3,,LOW,CWE-770,
|
|
6348
6625
|
GHSA-fpgg-r39h-3x5x,2020-09-03T17:06:22Z,"Malicious Package in cxt",cxt,0.0.0,,,CRITICAL,CWE-506,
|
|
6349
6626
|
GHSA-fpw3-x4xq-6vxq,2020-09-02T18:32:13Z,"Malicious Package in wepack-cli",wepack-cli,0,,,CRITICAL,CWE-506,
|
|
6627
|
+
GHSA-fpw4-p57j-hqmq,2026-04-16T22:49:13Z,"Paperclip: Stored XSS via javascript: URLs in MarkdownBody — urlTransform override disables react-markdown sanitization",@paperclipai/ui,0,2026.416.0,,MODERATE,CWE-79,
|
|
6628
|
+
GHSA-fqrj-m88p-qf3v,2026-04-07T18:14:50Z,"OpenClaw: Zalo replay dedupe cache could suppress events across authenticated webhook targets",openclaw,2026.2.19,2026.3.31,,LOW,CWE-287,
|
|
6350
6629
|
GHSA-fqw4-mph7-2vr8,2026-03-27T22:29:47Z,"OpenClaw: Silent privilege escalation via gateway shared-auth reconnect",openclaw,0,,2026.3.24,CRITICAL,CWE-863,
|
|
6351
6630
|
GHSA-fqw7-8v6m-2f86,2020-09-02T21:37:39Z,"Malicious Package in hulp",hulp,0,,,CRITICAL,CWE-506,
|
|
6352
6631
|
GHSA-fr4j-65pv-gjjj,2026-01-13T20:28:16Z,"Renovate vulnerable to arbitrary command injection via npm manager and malicious Renovate configuration",renovate,35.63.0,40.33.0,,MODERATE,CWE-77,
|
|
@@ -6357,14 +6636,16 @@ GHSA-fvfv-ppw4-7h2w,2026-02-26T22:46:42Z,"n8n has a Guardrail Node Bypass",n8n,0
|
|
|
6357
6636
|
GHSA-fvwr-h9xh-m6wc,2020-09-03T20:33:17Z,"Denial of Service in @commercial/subtext",@commercial/subtext,0,5.1.1,,HIGH,CWE-400,
|
|
6358
6637
|
GHSA-fw4p-36j9-rrj3,2020-09-03T20:25:33Z,"Denial of Service in sequelize",sequelize,0,4.44.4,,MODERATE,CWE-248,
|
|
6359
6638
|
GHSA-fw76-p9p2-6pvf,2020-09-03T19:58:58Z,"Malicious Package in serilize",serilize,0.0.0,,,CRITICAL,CWE-506,
|
|
6639
|
+
GHSA-fwjq-xwfj-gv75,2026-04-07T18:11:09Z,"OpenClaw: `session_status` still bypasses configured `tools.sessions.visibility` for unsandboxed invocations ",openclaw,0,2026.3.31,,MODERATE,CWE-863,
|
|
6360
6640
|
GHSA-fwvq-x4j9-hr5f,2020-09-03T19:43:09Z,"Malicious Package in bs58chekc",bs58chekc,0.0.0,,,CRITICAL,CWE-506,
|
|
6361
6641
|
GHSA-g27f-9qjv-22pm,2026-02-17T21:31:39Z,"OpenClaw log poisoning (indirect prompt injection) via WebSocket headers",openclaw,0,2026.2.13,,LOW,CWE-117,
|
|
6362
6642
|
GHSA-g2c4-4m64-vxm3,2020-09-03T22:15:25Z,"Malicious Package in buffer-yor",buffer-yor,0.0.0,,,CRITICAL,CWE-506,
|
|
6363
6643
|
GHSA-g2f6-pwvx-r275,2026-03-16T20:41:12Z,"OpneClaw accepts unsanitized iMessage attachment paths which allowed SCP remote-path command injection",openclaw,0,2026.3.13,,HIGH,CWE-78,
|
|
6644
|
+
GHSA-g2hm-779g-vm32,2026-04-17T21:48:25Z,"OpenClaw: Heartbeat owner downgrade missed untrusted webhook wake events",openclaw,2026.4.7,2026.4.14,,MODERATE,CWE-863,
|
|
6364
6645
|
GHSA-g336-c7wv-8hp3,2020-09-01T15:58:06Z,"Cross-Site Scripting in swagger-ui",swagger-ui,0,2.2.1,,CRITICAL,CWE-79,
|
|
6365
|
-
GHSA-g353-mgv3-8pcj,2026-03-13T20:55:34Z,"OpenClaw: Feishu webhook mode accepted forged events when only `verificationToken` was configured",openclaw,0,2026.3.12,,HIGH,CWE-347,
|
|
6366
6646
|
GHSA-g35x-j6jj-8g7j,2023-05-02T16:51:25Z,"@mittwald/kubernetes's secret contents leaked via debug logging",@mittwald/kubernetes,0,3.5.0,,MODERATE,CWE-532,
|
|
6367
6647
|
GHSA-g374-mggx-p6xc,2026-04-03T03:05:48Z,"OpenClaw: Incomplete scope-clearing fix allows operator.admin escalation via trusted-proxy auth mode",openclaw,0,2026.3.31,,HIGH,CWE-863,
|
|
6648
|
+
GHSA-g375-h3v6-4873,2026-04-17T21:48:57Z,"OpenClaw: Heartbeat owner downgrade missed local async exec completion events",openclaw,2026.3.31,2026.4.10,,MODERATE,CWE-269,
|
|
6368
6649
|
GHSA-g376-whg7-896m,2020-09-01T18:45:53Z,"Directory Traversal in yjmyjmyjm",yjmyjmyjm,0.0.0,,,HIGH,CWE-22,
|
|
6369
6650
|
GHSA-g37j-v5gh-g25c,2020-09-03T23:06:48Z,"Malicious Package in js-shi3",js-shi3,0.0.0,,,CRITICAL,CWE-506,
|
|
6370
6651
|
GHSA-g3qj-j598-cxmq,2026-03-24T19:10:38Z,"fido2-lib is vulnerable to DoS via cbor-extract heap buffer over-read in CBOR attestation parsing",fido2-lib,0,3.5.8,,HIGH,CWE-125;CWE-126;CWE-1395,
|
|
@@ -6380,13 +6661,13 @@ GHSA-g74r-ffvr-5q9f,2019-06-03T17:26:44Z,"Memory Exposure in concat-stream",conc
|
|
|
6380
6661
|
GHSA-g74r-ffvr-5q9f,2019-06-03T17:26:44Z,"Memory Exposure in concat-stream",concat-stream,1.4.0,1.4.11,,MODERATE,CWE-200,
|
|
6381
6662
|
GHSA-g74r-ffvr-5q9f,2019-06-03T17:26:44Z,"Memory Exposure in concat-stream",concat-stream,1.5.0,1.5.2,,MODERATE,CWE-200,
|
|
6382
6663
|
GHSA-g753-jx37-7xwh,2020-06-30T16:05:08Z,"ECDSA signature vulnerability of Minerva timing attack in jsrsasign",jsrsasign,4.0.0,8.0.13,,MODERATE,CWE-362,
|
|
6383
|
-
GHSA-g7cr-9h7q-4qxq,2026-03-12T14:21:35Z,"OpenClaw's MS Teams sender allowlist bypass when route allowlist is configured and sender allowlist is empty",openclaw,0,2026.3.8,,MODERATE,CWE-289,
|
|
6384
6664
|
GHSA-g7h8-p22m-2rvx,2020-09-04T15:08:46Z,"Prototype Pollution in flat-wrap",flat-wrap,0.0.0,,,HIGH,CWE-1321,
|
|
6385
6665
|
GHSA-g7mw-5cq6-fv82,2020-09-02T21:20:40Z,"Cross-Site Scripting in wangeditor",wangeditor,0,,,HIGH,CWE-79,
|
|
6386
6666
|
GHSA-g839-vp47-wgh8,2026-03-21T03:31:15Z,"Duplicate Advisory: OpenClaw's Slack reaction/pin sender-policy consistency issue in non-message ingress",openclaw,0,,2026.2.24,MODERATE,CWE-863,
|
|
6387
6667
|
GHSA-g86v-f9qv-rh6m,2026-03-31T23:58:43Z,"OpenClaw SSRF guard misses four IPv6 special-use ranges",openclaw,0,2026.3.28,,LOW,CWE-918,
|
|
6388
6668
|
GHSA-g8jc-mm3c-cwhj,2020-09-02T20:31:06Z,"Malicious Package in reques",reques,0,,,CRITICAL,CWE-506,
|
|
6389
6669
|
GHSA-g8m7-qhv7-9h5x,2019-07-05T21:07:14Z,"Path Traversal in serve-here.js",serve-here,0,,3.2.0,HIGH,CWE-22,
|
|
6670
|
+
GHSA-g8mc-c5f2-mqg7,2026-04-10T00:30:30Z,"Duplicate Advisory: OpenClaw Bypasses DM Policy Separation via Synology Chat Webhook Path Collision",openclaw,0,2026.3.22,,MODERATE,CWE-706,
|
|
6390
6671
|
GHSA-g8q2-24jh-5hpc,2018-07-27T14:47:52Z,"High severity vulnerability that affects jquery-ui",jquery-ui,0,1.12.0,,HIGH,,
|
|
6391
6672
|
GHSA-g8vp-6hv4-m67c,2020-09-11T21:23:29Z,"Command Injection in entitlements",entitlements,0,1.3.0,,HIGH,CWE-77,
|
|
6392
6673
|
GHSA-g8xp-qx39-9jq9,2026-04-03T03:00:51Z,"OpenClaw: Incomplete host-env-security-policy allows untrusted model to substitute compiler binaries via env overrides",openclaw,0,2026.3.31,,HIGH,CWE-427,
|
|
@@ -6399,20 +6680,24 @@ GHSA-g9wf-393q-4w38,2020-09-03T17:28:26Z,"Malicious Package in only-test-not-ins
|
|
|
6399
6680
|
GHSA-g9wg-wq4f-2x5w,2020-09-03T19:00:10Z,"Cross-Site Scripting in console-feed",console-feed,0,2.8.10,,HIGH,CWE-79,
|
|
6400
6681
|
GHSA-gc25-3vc5-2jf9,2020-09-04T15:00:58Z,"Sandbox Breakout / Arbitrary Code Execution in sandbox",sandbox,0.0.0,,,CRITICAL,,
|
|
6401
6682
|
GHSA-gc94-6w89-hpqr,2019-06-12T16:37:07Z,"Command Injection in fs-path",fs-path,0,0.0.25,,HIGH,CWE-77,
|
|
6683
|
+
GHSA-gc9r-867r-j85f,2026-04-17T21:51:04Z,"OpenClaw: Microsoft Teams SSO invoke handler missed sender authorization checks",openclaw,2026.4.10,2026.4.14,,LOW,CWE-862,
|
|
6402
6684
|
GHSA-gcfc-mgg3-8j2c,2020-09-03T18:11:29Z,"Malicious Package in sdfjghlkfjdshlkjdhsfg",sdfjghlkfjdshlkjdhsfg,0.0.0,,,CRITICAL,CWE-506,
|
|
6403
6685
|
GHSA-gcj7-r3hg-m7w6,2026-03-03T22:25:37Z,"OpenClaw's voice-call Twilio replay dedupe now bound to authenticated webhook identity",openclaw,0,2026.2.26,,LOW,CWE-294;CWE-345,
|
|
6404
6686
|
GHSA-gf8q-jrpm-jvxq,2022-01-08T00:22:02Z,"URL parsing in node-forge could lead to undesired behavior.",node-forge,0,1.0.0,,LOW,CWE-601,
|
|
6405
6687
|
GHSA-gfj6-p24g-6hpm,2020-09-03T22:55:06Z,"Malicious Package in jc-sha3",jc-sha3,0.0.0,,,CRITICAL,CWE-506,
|
|
6406
6688
|
GHSA-gfjr-xqhm-qvv3,2020-09-02T20:16:09Z,"Malicious Package in aysnc",aysnc,0,,,CRITICAL,CWE-506,
|
|
6407
6689
|
GHSA-gfm8-g3vm-53jh,2020-09-03T17:21:19Z,"Malicious Package in leetlog",leetlog,0.1.2,,,CRITICAL,CWE-506,
|
|
6690
|
+
GHSA-gfmx-pph7-g46x,2026-04-09T14:22:14Z,"OpenClaw: Lower-trust background runtime output is injected into trusted `System:` events, and local async exec completion misses the intended `exec-event` downgrade",openclaw,0,2026.4.8,,HIGH,CWE-501,
|
|
6408
6691
|
GHSA-gg9v-mgcp-v6m7,2026-04-03T03:19:33Z,"OpenClaw: Unbound bootstrap setup codes allow privilege escalation during pairing",openclaw,0,2026.3.22,,HIGH,CWE-269,
|
|
6409
6692
|
GHSA-ggm6-h3mx-cmmp,2026-03-19T03:30:57Z,"Duplicate Advisory: safeBins stdin-only bypass via sort output and recursive grep flags",openclaw,0,,2026.2.17,LOW,CWE-78,
|
|
6693
|
+
GHSA-gj9q-8w99-mp8j,2026-04-16T21:19:21Z,"OpenClaw: TOCTOU read in exec script preflight",openclaw,0,2026.4.10,,LOW,CWE-367,
|
|
6410
6694
|
GHSA-gjhc-6xm7-mc8q,2024-01-03T18:30:51Z,"Duplicate Advisory: Cross-site scripting vulnerability in TinyMCE",tinymce,0,5.9.0,,MODERATE,CWE-79,
|
|
6411
6695
|
GHSA-gjm7-hw8f-73rq,2026-04-03T03:15:08Z,"OpenClaw: Paired node escalates to gateway RCE via unrestricted node.event agent dispatch",openclaw,0,2026.3.31,,HIGH,CWE-863,
|
|
6412
6696
|
GHSA-gjph-xf5q-6mfq,2020-09-03T15:46:02Z,"Denial of Service in @hapi/ammo",@hapi/ammo,0,3.1.2,,HIGH,,
|
|
6413
6697
|
GHSA-gjph-xf5q-6mfq,2020-09-03T15:46:02Z,"Denial of Service in @hapi/ammo",@hapi/ammo,4.0.0,5.0.1,,HIGH,,
|
|
6414
6698
|
GHSA-gm68-572p-q28r,2023-07-06T15:30:51Z,"@vendure/admin-ui-plugin authenticated Cross-site Scripting vulnerability",@vendure/admin-ui-plugin,0,2.0.3,,MODERATE,CWE-79,
|
|
6415
6699
|
GHSA-gm9g-2g8v-fvxj,2019-06-06T15:32:28Z,"Prototype Pollution in upmerge",upmerge,0,,0.1.8,MODERATE,CWE-345;CWE-400,
|
|
6700
|
+
GHSA-gm9m-x74r-8whg,2026-03-31T15:31:56Z,"Duplicate Advisory: OpenClaw's Nextcloud Talk webhook missing rate limiting on shared secret authentication",openclaw,0,2026.3.28,,MODERATE,CWE-307,
|
|
6416
6701
|
GHSA-gm9x-q798-hmr4,2020-07-29T14:53:40Z,"Command Injection in git-tags-remote",git-tags-remote,0,1.0.4,,HIGH,CWE-78,
|
|
6417
6702
|
GHSA-gmjp-776j-2394,2020-09-03T17:04:24Z,"Malicious Package in ripmed160",ripmed160,0.0.0,,,CRITICAL,CWE-506,
|
|
6418
6703
|
GHSA-gp3q-wpq4-5c5h,2026-03-12T14:21:45Z,"OpenClaw: LINE group allowlist scope mismatch with DM pairing-store entries",openclaw,0,2026.2.26,,HIGH,CWE-863,
|
|
@@ -6421,6 +6706,7 @@ GHSA-gpv5-7x3g-ghjv,2023-06-15T19:05:13Z,"fast-xml-parser regex vulnerability pa
|
|
|
6421
6706
|
GHSA-gq3j-xvxp-8hrf,2026-02-19T20:15:59Z,"Hono added timing comparison hardening in basicAuth and bearerAuth",hono,0,4.11.10,,LOW,CWE-208,
|
|
6422
6707
|
GHSA-gqf6-75v8-vr26,2020-09-04T16:56:11Z,"Arbitrary File Write in bin-links",bin-links,0,1.1.5,,LOW,,
|
|
6423
6708
|
GHSA-gqq4-937c-2282,2020-09-03T22:49:42Z,"Malicious Package in juffer-xor",juffer-xor,0.0.0,,,CRITICAL,CWE-506,
|
|
6709
|
+
GHSA-gqqj-85qm-8qhf,2026-04-16T22:47:40Z,"Paperclip: codex_local inherited ChatGPT/OpenAI-connected Gmail and was able to send real email",paperclipai,0,,2026.403.0,HIGH,CWE-284,
|
|
6424
6710
|
GHSA-gr4j-r575-g665,2020-08-25T14:04:47Z,"Cross-Site Scripting in highcharts",highcharts,0,7.2.2,,HIGH,CWE-79,
|
|
6425
6711
|
GHSA-gr4j-r575-g665,2020-08-25T14:04:47Z,"Cross-Site Scripting in highcharts",highcharts,8.0.0,8.1.1,,HIGH,CWE-79,
|
|
6426
6712
|
GHSA-gvff-25cc-4f66,2020-09-03T17:15:56Z,"Path Traversal in restify-swagger-jsdoc",restify-swagger-jsdoc,0,3.2.1,,HIGH,CWE-22,
|
|
@@ -6440,17 +6726,17 @@ GHSA-h25m-26qc-wcjf,2026-01-28T15:38:01Z,"Next.js HTTP request deserialization c
|
|
|
6440
6726
|
GHSA-h26f-j4mv-84g7,2020-09-02T18:39:43Z,"Malicious Package in asycn",asycn,0,,,CRITICAL,CWE-506,
|
|
6441
6727
|
GHSA-h29r-4vqp-8jxf,2020-08-20T17:21:46Z,"Cross-Site Scripting in keystone",keystone,0,4.0.0,,MODERATE,,
|
|
6442
6728
|
GHSA-h2j3-gg8w-4858,2020-09-03T22:12:09Z,"Malicious Package in buffer-xos",buffer-xos,0.0.0,,,CRITICAL,CWE-506,
|
|
6729
|
+
GHSA-h2v7-xc88-xx8c,2026-04-07T18:10:04Z,"OpenClaw: `/phone arm`/`/phone disarm` Bypasses `operator.admin` Scope Check for External Channels ",openclaw,0,2026.3.28,,MODERATE,CWE-285,
|
|
6443
6730
|
GHSA-h36m-2vh5-x699,2026-03-19T03:30:57Z,"Duplicate Advisory: ACPX Windows wrapper shell fallback allowed cwd injection in specific paths",openclaw,2026.2.26,,,MODERATE,CWE-78,
|
|
6444
6731
|
GHSA-h3hw-29fv-2x75,2026-01-21T16:36:27Z,"@envelop/graphql-modules has a Race Condition vulnerability",@envelop/graphql-modules,0,9.1.0,,HIGH,CWE-362,
|
|
6445
6732
|
GHSA-h3m2-h22h-695r,2020-09-03T17:29:31Z,"Malicious Package in ali-contributor",ali-contributor,0.0.0,,,CRITICAL,CWE-506,
|
|
6446
|
-
GHSA-h3x4-hc5v-v2gm,2026-03-26T19:07:55Z,"OpenClaw: Windows media loaders accepted remote-host file URLs before local path validation",openclaw,0,2026.3.22,,MODERATE,CWE-40,
|
|
6447
6733
|
GHSA-h42x-xx2q-6v6g,2025-03-13T22:38:03Z,"Flowise Pre-auth Arbitrary File Upload",flowise,0,,2.2.7,CRITICAL,CWE-434,
|
|
6734
|
+
GHSA-h43v-27wg-5mf9,2026-04-07T18:14:39Z,"OpenClaw: Forged Nostr DMs could create pairing state before signature verification",openclaw,2026.3.22,2026.3.31,,MODERATE,CWE-347,
|
|
6448
6735
|
GHSA-h44f-769q-j6px,2020-09-02T20:33:14Z,"Malicious Package in requet",requet,0,,,CRITICAL,CWE-506,
|
|
6449
6736
|
GHSA-h45p-w933-jxh3,2021-06-01T21:20:22Z,"Improper Verification of Cryptographic Signature in aws-encryption-sdk-javascript ","@aws-crypto/client-browser",0,1.9.0,,MODERATE,CWE-347,
|
|
6450
6737
|
GHSA-h45p-w933-jxh3,2021-06-01T21:20:22Z,"Improper Verification of Cryptographic Signature in aws-encryption-sdk-javascript ","@aws-crypto/client-browser",2.0.0,2.2.0,,MODERATE,CWE-347,
|
|
6451
6738
|
GHSA-h45p-w933-jxh3,2021-06-01T21:20:22Z,"Improper Verification of Cryptographic Signature in aws-encryption-sdk-javascript ",@aws-crypto/client-node,0,1.9.0,,MODERATE,CWE-347,
|
|
6452
6739
|
GHSA-h45p-w933-jxh3,2021-06-01T21:20:22Z,"Improper Verification of Cryptographic Signature in aws-encryption-sdk-javascript ",@aws-crypto/client-node,2.0.0,2.2.0,,MODERATE,CWE-347,
|
|
6453
|
-
GHSA-h4jx-hjr3-fhgc,2026-03-29T15:49:34Z,"OpenClaw: Gateway Plugin Subagent Fallback `deleteSession` Uses Synthetic `operator.admin`",openclaw,0,2026.3.28,,HIGH,CWE-266;CWE-863,
|
|
6454
6740
|
GHSA-h5hg-h7rr-gpf3,2026-04-03T03:18:10Z,"OpenClaw: Node browser proxy `allowProfiles` bypass through persistent profile mutation and runtime profile selection",openclaw,0,2026.3.22,,HIGH,CWE-863,
|
|
6455
6741
|
GHSA-h5mp-5q4p-ggf5,2020-09-03T18:07:05Z,"Prototype Pollution in lodash.defaultsdeep",lodash.defaultsdeep,0,4.6.1,,HIGH,CWE-1321,
|
|
6456
6742
|
GHSA-h5vj-f7r9-w564,2020-09-01T21:22:35Z,"Entropy Backdoor in text-qrcode",text-qrcode,0.0.0,,,HIGH,CWE-506,
|
|
@@ -6467,8 +6753,6 @@ GHSA-h97f-6pqj-q452,2026-03-03T21:48:55Z,"OpenClaw has a IPv6 multicast SSRF cla
|
|
|
6467
6753
|
GHSA-h97g-4mx7-5p2p,2020-09-03T17:11:36Z,"Open Redirect in apostrophe",apostrophe,0,2.92.0,,MODERATE,CWE-601,
|
|
6468
6754
|
GHSA-h9wq-xcqx-mqxm,2023-07-11T22:46:19Z,"Vendure Cross Site Request Forgery vulnerability impacting all API requests",@vendure/core,0,2.0.3,,LOW,,
|
|
6469
6755
|
GHSA-h9wr-xr4r-66fh,2020-09-03T18:20:20Z,"Cross-Site Scripting in dmn-js-properties-panel",dmn-js-properties-panel,0,0.3.0,,HIGH,CWE-79,
|
|
6470
|
-
GHSA-hc5h-pmr3-3497,2026-03-31T23:50:22Z,"OpenClaw: /pair approve command path omitted caller scope subsetting and reopened device pairing escalation",openclaw,0,2026.3.28,,HIGH,CWE-863,
|
|
6471
|
-
GHSA-hf68-49fm-59cq,2026-03-26T21:40:57Z,"OpenClaw Gateway: RCE and Privilege Escalation from operator.pairing to operator.admin via device.pair.approve",openclaw,0,2026.3.22,,CRITICAL,CWE-269,
|
|
6472
6756
|
GHSA-hfpr-jhpq-x4rm,2026-03-09T19:54:41Z,"OpenClaw: `operator.write` chat.send could reach admin-only config writes",openclaw,0,2026.3.7,,MODERATE,CWE-863,
|
|
6473
6757
|
GHSA-hfwx-c7q6-g54c,2021-03-12T23:04:46Z,"Vulnerability allowing for reading internal HTTP resources",highcharts-export-server,0,2.1.0,,HIGH,CWE-552,
|
|
6474
6758
|
GHSA-hfxh-rjv7-2369,2023-11-27T17:25:11Z,"Uptime Kuma Authenticated remote code execution via TailscalePing",uptime-kuma,1.23.0,1.23.7,,MODERATE,,
|
|
@@ -6478,18 +6762,19 @@ GHSA-hg7c-66ff-9q8g,2020-07-31T16:18:53Z,"Sandbox bypass in constantinople",cons
|
|
|
6478
6762
|
GHSA-hg7w-2pf7-mxm2,2020-09-03T17:02:31Z,"Malicious Package in wbe3",wbe3,0.0.0,,,CRITICAL,CWE-506,
|
|
6479
6763
|
GHSA-hgr5-82rc-p936,2020-09-01T21:24:41Z,"Cross-Site Scripting in md-data-table",md-data-table,0.0.0,,,HIGH,CWE-79,
|
|
6480
6764
|
GHSA-hgwm-pv9h-q5m7,2020-09-18T18:03:29Z,"Potential XSS in jQuery dependency in Mirador",mirador,0,3.0.0-alpha.0,,MODERATE,CWE-79,
|
|
6765
|
+
GHSA-hgwr-wr8h-rxm7,2026-04-10T00:30:29Z,"Duplicate Advisory: OpenClaw: Google Chat app-url webhook auth accepted non-deployment add-on principals",openclaw,0,,,MODERATE,CWE-290,
|
|
6481
6766
|
GHSA-hgxv-3497-3hhj,2023-07-04T18:30:58Z,"Duplicate Advisory: @fastify/oauth2 Oauth2 state parameter reuse",@fastify/oauth2,0,7.2.0,,MODERATE,,
|
|
6482
6767
|
GHSA-hh43-q692-2xmq,2026-03-29T15:30:19Z,"Duplicate Advisory: `OpenClaw: session_status` let sandboxed subagents access parent or sibling session state",openclaw,0,,2026.3.8,CRITICAL,CWE-863,
|
|
6483
6768
|
GHSA-hhff-fj5f-qg48,2026-04-03T02:56:20Z,"OpenClaw runs Discord audio preflight transcription before member authorization",openclaw,0,2026.3.31,,MODERATE,CWE-770,
|
|
6484
6769
|
GHSA-hhq4-97c2-p447,2026-04-02T20:59:11Z,"OpenClaw: Zalo webhook replay cache cross-target messageId scope bypass",openclaw,0,2026.3.31,,LOW,CWE-294,
|
|
6485
6770
|
GHSA-hj5w-xgw9-w4rj,2020-09-03T19:41:44Z,"Malicious Package in coinstrng",coinstrng,0.0.0,,,CRITICAL,CWE-506,
|
|
6771
|
+
GHSA-hm63-vwj4-mj2q,2026-04-10T00:30:30Z,"Duplicate Advisory: OpenClaw: Remote media error responses could trigger unbounded memory allocation before failure",openclaw,0,2026.3.22,,MODERATE,CWE-789,
|
|
6486
6772
|
GHSA-hmfr-rx46-4jx2,2025-08-26T18:42:37Z,"GraphQL Armor Max-Depth Plugin Bypass via Introspection Query Obfuscation","@escape.tech/graphql-armor-max-depth",0,2.4.2,,MODERATE,CWE-400,
|
|
6487
6773
|
GHSA-hpfq-8wx8-cgqw,2019-06-13T18:59:18Z,"Cross-Site Scripting in ids-enterprise",ids-enterprise,0,4.18.2,,HIGH,CWE-79,
|
|
6488
6774
|
GHSA-hpr5-wp7c-hh5q,2020-09-01T19:37:29Z,"Cross-Site Scripting in mrk.js",mrk.js,0,2.0.1,,HIGH,CWE-79,
|
|
6489
6775
|
GHSA-hq75-xg7r-rx6c,2025-07-11T17:09:53Z,"Better Call routing bug can lead to Cache Deception",better-call,0,1.0.12,,MODERATE,CWE-525,
|
|
6490
6776
|
GHSA-hq8g-qq57-5275,2020-09-11T21:24:33Z,"SQL Injection in untitled-model",untitled-model,0,,,HIGH,CWE-89,
|
|
6491
6777
|
GHSA-hqf9-8xv5-x8xw,2026-01-05T19:57:46Z,"ERC7984ERC20Wrapper: once a wrapper is filled, subsequent wrap requests do not revert and result in loss of funds.","@openzeppelin/confidential-contracts",0,0.3.1,,MODERATE,CWE-190,
|
|
6492
|
-
GHSA-hr5v-j9h9-xjhg,2026-03-30T18:31:02Z,"OpenClaw has Sandbox Media Root Bypass via Unnormalized `mediaUrl` / `fileUrl` Parameter Keys (CWE-22)",openclaw,0,2026.3.24,,HIGH,CWE-22,
|
|
6493
6778
|
GHSA-hr8g-2q7x-3f4w,2026-04-03T03:02:37Z,"OpenClaw Has a Gateway Control Interface Information Disclosure Vulnerability",openclaw,0,2026.3.31,,MODERATE,CWE-200,
|
|
6494
6779
|
GHSA-hrpp-f84w-xhfg,2020-09-04T16:55:06Z,"Outdated Static Dependency in vue-moment",vue-moment,0,4.1.0,,MODERATE,CWE-1104,
|
|
6495
6780
|
GHSA-hv4w-jhcj-6wfw,2020-09-03T20:34:23Z,"Cross-Site Scripting in snekserve",snekserve,0.0.0,,,HIGH,CWE-79,
|
|
@@ -6509,16 +6794,19 @@ GHSA-hxxf-q3w9-4xgw,2018-07-12T19:52:02Z,"Malicious Package in eslint-scope",esl
|
|
|
6509
6794
|
GHSA-j26j-7qc4-3mrf,2026-03-03T21:36:49Z,"OpenClaw: MS Teams fileConsent/invoke missing conversation binding allowed cross-conversation pending-upload consumption",openclaw,0,2026.2.25,,MODERATE,CWE-639;CWE-862,
|
|
6510
6795
|
GHSA-j3qq-qvc8-c6g7,2020-09-01T21:15:09Z,"Malicious Package in foever",foever,0,,,CRITICAL,CWE-506,
|
|
6511
6796
|
GHSA-j425-whc4-4jgc,2026-03-09T19:52:59Z,"OpenClaw's `system.run` env override filtering allowed dangerous helper-command pivots",openclaw,0,2026.3.7,,MODERATE,CWE-15;CWE-639,
|
|
6797
|
+
GHSA-j42q-r6qx-xrfp,2026-04-10T00:30:29Z,"Duplicate Advisory: OpenClaw: Google Chat Authz Bypass via Group Policy Rebinding with Mutable Space displayName",openclaw,0,,2026.3.24,LOW,CWE-807,
|
|
6512
6798
|
GHSA-j44m-5v8f-gc9c,2025-10-10T22:55:09Z,"Flowise is vulnerable to arbitrary file exposure through its ReadFileTool",flowise,0,3.0.8,,HIGH,CWE-22,
|
|
6513
6799
|
GHSA-j44m-5v8f-gc9c,2025-10-10T22:55:09Z,"Flowise is vulnerable to arbitrary file exposure through its ReadFileTool",flowise-components,0,3.0.8,,HIGH,CWE-22,
|
|
6514
|
-
GHSA-j4c9-w69r-cw33,2026-03-29T15:50:23Z,"OpenClaw: Telegram DM-Scoped Inline Button Callbacks Bypass DM Pairing and Mutate Session State",openclaw,0,2026.3.28,,MODERATE,CWE-285;CWE-863,
|
|
6515
6800
|
GHSA-j4mr-9xw3-c9jx,2019-05-31T23:47:01Z,"Out-of-bounds Read in base64-url",base64-url,0,2.0.0,,HIGH,CWE-125,
|
|
6516
6801
|
GHSA-j4vm-hg8g-g9qv,2020-09-03T17:33:50Z,"Malicious Package in antd-cloud",antd-cloud,0.0.0,,,CRITICAL,CWE-506,
|
|
6802
|
+
GHSA-j56c-wpqm-h24x,2026-04-10T00:30:29Z,"Duplicate Advisory: OpenClaw: Plivo V2 verified replay identity drifts on query-only variants",openclaw,0,2026.3.23,,HIGH,CWE-294,
|
|
6517
6803
|
GHSA-j59f-6m4q-62h6,2019-05-30T17:28:48Z,"Improper Key Verification in ipns",ipns,0,0.1.3,,HIGH,CWE-287,
|
|
6518
6804
|
GHSA-j5g3-5c8r-7qfx,2023-08-30T21:24:57Z,"Prevent logging invalid header values",@apollo/server,0,4.9.3,,LOW,,
|
|
6519
6805
|
GHSA-j5g3-5c8r-7qfx,2023-08-30T21:24:57Z,"Prevent logging invalid header values",apollo-server-core,0,2.26.1,,LOW,,
|
|
6520
6806
|
GHSA-j5g3-5c8r-7qfx,2023-08-30T21:24:57Z,"Prevent logging invalid header values",apollo-server-core,3.0.0,3.12.1,,LOW,,
|
|
6807
|
+
GHSA-j5qh-5234-4rqp,2026-03-31T12:31:35Z,"Duplicate Advisory: OpenClaw: Workspace plugin auto-discovery allowed code execution from cloned repositories",openclaw,0,2026.3.12,,HIGH,CWE-829,
|
|
6521
6808
|
GHSA-j67m-jg9p-ppg4,2020-09-03T23:18:05Z,"Malicious Package in ns-sha3",ns-sha3,0.0.0,,,CRITICAL,CWE-506,
|
|
6809
|
+
GHSA-j6c7-3h5x-99g9,2026-04-17T21:53:36Z,"OpenClaw: Shell-wrapper detection missed env-argv assignment injection forms",openclaw,2026.2.22,2026.4.12,,MODERATE,CWE-78,
|
|
6522
6810
|
GHSA-j6v9-xgvh-f796,2020-09-11T21:11:34Z,"Command Injection in wxchangba",wxchangba,0.0.0,,,MODERATE,CWE-77,
|
|
6523
6811
|
GHSA-j6x7-42x2-hpcf,2020-09-03T22:14:20Z,"Malicious Package in buffer-xoz",buffer-xoz,0.0.0,,,CRITICAL,CWE-506,
|
|
6524
6812
|
GHSA-j7p2-qcwm-94v4,2026-03-31T23:59:36Z,"OpenClaw's incomplete host env sanitization blocklist allows supply-chain redirection via package-manager env overrides",openclaw,0,2026.3.22,,CRITICAL,CWE-183,
|
|
@@ -6532,12 +6820,14 @@ GHSA-j965-2qgj-vjmq,2026-01-08T22:04:26Z,"JavaScript SDK v2 users should add val
|
|
|
6532
6820
|
GHSA-j9f8-8h89-j69x,2019-06-11T16:16:34Z,"Remote Code Execution in node-os-utils",node-os-utils,0,1.1.0,,HIGH,CWE-94,
|
|
6533
6821
|
GHSA-j9pv-rrcj-6pfx,2026-04-02T21:01:57Z,"OpenClaw: SSH-based sandbox backends pass unsanitized process.env to child processes",openclaw,0,2026.3.31,,MODERATE,CWE-212,
|
|
6534
6822
|
GHSA-jc5m-wrp2-qq38,2026-03-05T21:58:02Z,"Flowise Vulnerable to PII Disclosure on Unauthenticated Forgot Password Endpoint",flowise,0,3.0.13,,MODERATE,CWE-200,
|
|
6535
|
-
GHSA-jccr-rrw2-vc8h,2026-03-31T23:56:13Z,"OpenClaw safeBins jq `$ENV` filter bypass allows environment variable disclosure",openclaw,0,2026.3.28,,HIGH,CWE-200,
|
|
6823
|
+
GHSA-jccr-rrw2-vc8h,2026-03-31T23:56:13Z,"OpenClaw safeBins jq `$ENV` filter bypass allows environment variable disclosure",openclaw,0,2026.3.28,,HIGH,CWE-185;CWE-200,
|
|
6536
6824
|
GHSA-jcgq-xh2f-2hfm,2021-02-25T01:20:42Z,"Regular Expression Denial of Service",eslint,0,4.18.2,,MODERATE,,
|
|
6537
6825
|
GHSA-jcgr-9698-82jx,2021-05-28T15:53:40Z,"Improper Neutralization of Special Elements used in a Command ('Command Injection') in @floffah/build",@floffah/build,0,1.0.0,,LOW,CWE-77,
|
|
6538
6826
|
GHSA-jchg-g94r-64qg,2020-09-03T19:50:10Z,"Malicious Package in mogobd",mogobd,0.0.0,,,CRITICAL,CWE-506,
|
|
6539
6827
|
GHSA-jcjx-c3j3-44pr,2021-11-10T16:44:12Z,"Insufficient Session Expiration in @cyyynthia/tokenize",@cyyynthia/tokenize,1.1.0,1.1.3,,HIGH,CWE-613,
|
|
6540
6828
|
GHSA-jcmh-9fvm-j39w,2020-09-03T19:42:23Z,"Malicious Package in body-parse-xml",body-parse-xml,0.0.0,,,CRITICAL,CWE-506,
|
|
6829
|
+
GHSA-jf25-7968-h2h5,2026-04-17T21:58:24Z,"OpenClaw: screen_record outPath bypassed workspace-only filesystem guard",openclaw,0,2026.4.10,,MODERATE,CWE-22;CWE-863,
|
|
6830
|
+
GHSA-jf56-mccx-5f3f,2026-04-09T14:22:23Z,"OpenClaw: Authenticated `/hooks/wake` and mapped `wake` payloads are promoted into the trusted `System:` prompt channel",openclaw,0,2026.4.8,,HIGH,CWE-501,
|
|
6541
6831
|
GHSA-jf6w-m8jw-jfxc,2026-03-13T15:48:11Z,"OpenClaw: Write-scoped callers could reach admin-only session reset logic through `agent`",openclaw,0,2026.3.11,,MODERATE,CWE-863,
|
|
6542
6832
|
GHSA-jf8x-wg7f-p3w8,2020-09-03T18:22:33Z,"Malicious Package in cage-js",cage-js,0.0.0,,,CRITICAL,CWE-506,
|
|
6543
6833
|
GHSA-jfcc-rm7f-xgf8,2020-09-03T20:36:35Z,"Cross-Site Scripting in mavon-editor",mavon-editor,0,2.8.2,,MODERATE,CWE-79,
|
|
@@ -6546,8 +6836,11 @@ GHSA-jh67-3wqw-cvhr,2020-09-03T23:13:52Z,"Malicious Package in js-sxa3",js-sxa3,
|
|
|
6546
6836
|
GHSA-jh8h-6c9q-7gmw,2026-02-26T22:45:41Z,"n8n has an Authentication Bypass in its Chat Trigger Node",n8n,0,1.123.22,,MODERATE,CWE-287,
|
|
6547
6837
|
GHSA-jh8h-6c9q-7gmw,2026-02-26T22:45:41Z,"n8n has an Authentication Bypass in its Chat Trigger Node",n8n,2.0.0,2.9.3,,MODERATE,CWE-287,
|
|
6548
6838
|
GHSA-jh8h-6c9q-7gmw,2026-02-26T22:45:41Z,"n8n has an Authentication Bypass in its Chat Trigger Node",n8n,2.10.0,2.10.1,,MODERATE,CWE-287,
|
|
6839
|
+
GHSA-jhm7-29pj-4xvf,2026-04-16T21:09:50Z,"@node-oauth/oauth2-server: PKCE code_verifier ABNF not enforced in token exchange allows brute-force redemption of intercepted authorization codes","@node-oauth/oauth2-server",0,5.3.0,,MODERATE,CWE-1289;CWE-307,
|
|
6840
|
+
GHSA-jhpv-5j76-m56h,2026-04-17T22:17:57Z,"OpenClaw: Sender policy bypass in host media attachment reads allows unauthorized local file disclosure",openclaw,2026.4.9,2026.4.10,,MODERATE,CWE-863,
|
|
6549
6841
|
GHSA-jj37-3377-m6vv,2025-11-14T21:30:29Z,"Duplicate Advisory: Nodemailer: Email to an unintended domain can occur due to Interpretation Conflict",nodemailer,0,7.0.7,,HIGH,CWE-436,
|
|
6550
6842
|
GHSA-jj6g-7j8p-7gf2,2019-05-30T21:03:24Z,"Cross-Site Scripting in bracket-template",bracket-template,0,,1.1.5,HIGH,CWE-79,
|
|
6843
|
+
GHSA-jj6q-rrrf-h66h,2026-04-07T18:16:03Z,"OpenClaw: Shared-secret comparison call sites leaked length information through timing",openclaw,0,2026.4.2,,MODERATE,CWE-208,
|
|
6551
6844
|
GHSA-jjgj-cpp9-cvpv,2026-03-04T19:28:11Z,"OpenClaw Vulnerable to Local File Exfiltration via MCP Tool Result MEDIA: Directive Injection",openclaw,0,2026.2.21,,MODERATE,CWE-200;CWE-22,
|
|
6552
6845
|
GHSA-jjhg-qw5v-r8xx,2020-09-03T19:01:20Z,"Malicious Package in anarchy",anarchy,0.0.0,,,CRITICAL,CWE-506,
|
|
6553
6846
|
GHSA-jjmg-x456-w976,2022-10-10T20:59:02Z,"Incorrect default cookie name and recommendation",csrf-csrf,0,2.2.1,,LOW,,
|
|
@@ -6555,6 +6848,9 @@ GHSA-jjw7-3vjf-fg5j,2026-04-02T20:58:08Z,"OpenClaw Nostr privateKey config redac
|
|
|
6555
6848
|
GHSA-jmqm-f2gx-4fjv,2020-07-07T18:59:10Z,"Sensitive information exposure through logs in npm-registry-fetch",npm-registry-fetch,0,4.0.5,,MODERATE,CWE-352,
|
|
6556
6849
|
GHSA-jmqm-f2gx-4fjv,2020-07-07T18:59:10Z,"Sensitive information exposure through logs in npm-registry-fetch",npm-registry-fetch,5.0.0,8.1.1,,MODERATE,CWE-352,
|
|
6557
6850
|
GHSA-jp4j-q5fc-58gv,2026-03-31T23:58:08Z,"OpenClaw's Discord component interaction ingress skips guild/channel policy enforcement",openclaw,2026.2.14,2026.3.28,,MODERATE,CWE-862,
|
|
6851
|
+
GHSA-jp74-mfrx-3qvh,2026-04-16T22:51:43Z,"Saltcorn: SQL Injection via Unparameterized Sync Endpoints (maxLoadedId)",@saltcorn/server,0,1.4.6,,CRITICAL,CWE-89,
|
|
6852
|
+
GHSA-jp74-mfrx-3qvh,2026-04-16T22:51:43Z,"Saltcorn: SQL Injection via Unparameterized Sync Endpoints (maxLoadedId)",@saltcorn/server,1.5.0-beta.0,1.5.6,,CRITICAL,CWE-89,
|
|
6853
|
+
GHSA-jp74-mfrx-3qvh,2026-04-16T22:51:43Z,"Saltcorn: SQL Injection via Unparameterized Sync Endpoints (maxLoadedId)",@saltcorn/server,1.6.0-alpha.0,1.6.0-beta.5,,CRITICAL,CWE-89,
|
|
6558
6854
|
GHSA-jp99-5h8w-gmxc,2020-09-04T15:03:13Z,"Sandbox Breakout / Arbitrary Code Execution in @zhaoyao91/eval-in-vm",@zhaoyao91/eval-in-vm,0.0.0,,,CRITICAL,,
|
|
6559
6855
|
GHSA-jp9g-5x75-ccp8,2020-09-02T21:34:30Z,"Malicious Package in colro-name",colro-name,0,,,CRITICAL,CWE-506,
|
|
6560
6856
|
GHSA-jq4x-98m3-ggq6,2026-03-02T22:32:23Z,"OpenClaw Canvas Path Traversal Information Disclosure Vulnerability",openclaw,0,2026.2.21,,HIGH,CWE-22,
|
|
@@ -6564,12 +6860,14 @@ GHSA-jqvv-r4w3-8f7w,2020-09-04T15:35:00Z,"Malicious Package in bictoind-rpc",bic
|
|
|
6564
6860
|
GHSA-jqx4-9gpq-rppm,2025-05-06T16:44:22Z,"@misskey-dev/summaly allows IP Filter Bypass via Redirect",@misskey-dev/summaly,5.1.0,5.2.1,,MODERATE,CWE-346,
|
|
6565
6861
|
GHSA-jr6x-2q95-fh2g,2026-03-02T21:59:51Z,"OpenClaw's authorization mismatch allowed write-scope agent runs to reach owner-only tools",openclaw,0,2026.3.1,,HIGH,CWE-269;CWE-862,
|
|
6566
6862
|
GHSA-jrj9-5qp6-2v8q,2020-09-03T23:22:19Z,"Machine-In-The-Middle in airtable",airtable,0.1.19,0.7.2,,HIGH,,
|
|
6863
|
+
GHSA-jvff-x2qm-6286,2026-04-10T22:10:49Z,"mathjs Allows Improperly Controlled Modification of Dynamically-Determined Object Attributes",mathjs,13.1.0,15.2.0,,HIGH,CWE-915,
|
|
6567
6864
|
GHSA-jvfv-jhw9-jmpp,2020-09-03T21:23:09Z,"Malicious Package in b5ffer-xor",b5ffer-xor,0.0.0,,,CRITICAL,CWE-506,
|
|
6865
|
+
GHSA-jwrq-8g5x-5fhm,2026-04-17T21:35:35Z,"OpenClaw: Collect-mode queue batches could reuse the last sender authorization context",openclaw,0,2026.4.14,,MODERATE,CWE-863,
|
|
6568
6866
|
GHSA-jxf5-7x3j-8j9m,2020-09-03T18:19:14Z,"Malicious Package in load-from-cwd-or-npm",load-from-cwd-or-npm,3.0.2,3.0.4,,CRITICAL,CWE-506,
|
|
6569
6867
|
GHSA-jxrq-8fm4-9p58,2026-03-03T23:09:31Z,"OpenClaw: Zip extraction symlink traversal could write outside destination",openclaw,0,2026.2.22,,HIGH,CWE-59,
|
|
6570
6868
|
GHSA-m2fp-c79h-rr79,2020-09-02T21:42:56Z,"Malicious Package in tensorplow",tensorplow,0,,,CRITICAL,CWE-506,
|
|
6869
|
+
GHSA-m34q-h93w-vg5x,2026-04-07T18:14:57Z,"OpenClaw: OpenShell mirror mode could delete arbitrary remote directories when roots were mis-scoped",openclaw,0,2026.4.2,,MODERATE,CWE-22,
|
|
6571
6870
|
GHSA-m36m-x4c5-rjxj,2020-09-01T19:01:58Z,"Silently Runs Cryptocoin Miner in hooka-tools",hooka-tools,0.0.0,,,LOW,,
|
|
6572
|
-
GHSA-m3mh-3mpg-37hw,2026-03-30T18:52:09Z,"OpenClaw has an Arbitrary Malicious Code Execution Vulnerability",openclaw,0,2026.3.24,,HIGH,CWE-426,
|
|
6573
6871
|
GHSA-m45f-4828-5cv5,2020-08-19T22:39:44Z,"Regular Expression Denial of Service in highcharts",highcharts,0,6.1.0,,MODERATE,,
|
|
6574
6872
|
GHSA-m489-xr35-fjxr,2021-09-22T20:35:08Z,"Regular Expression Denial of Service in millisecond",millisecond,0,0.1.2,,MODERATE,CWE-1333;CWE-400,
|
|
6575
6873
|
GHSA-m4fq-xh7w-jhfm,2020-09-03T19:39:46Z,"Malicious Package in crytpo-js",crytpo-js,0.0.0,,,CRITICAL,CWE-506,
|
|
@@ -6580,6 +6878,7 @@ GHSA-m56h-5xx3-2jc2,2024-12-18T15:50:09Z,"Prototype pollution in jsii.configureC
|
|
|
6580
6878
|
GHSA-m56h-5xx3-2jc2,2024-12-18T15:50:09Z,"Prototype pollution in jsii.configureCategories",jsii,5.6.0,5.6.4,,LOW,CWE-1321,
|
|
6581
6879
|
GHSA-m56h-5xx3-2jc2,2024-12-18T15:50:09Z,"Prototype pollution in jsii.configureCategories",jsii,5.7.0,5.7.3,,LOW,CWE-1321,
|
|
6582
6880
|
GHSA-m5ch-gx8g-rg73,2020-09-02T15:43:53Z,"Remote Code Execution in pomelo-monitor",pomelo-monitor,0.0.0,,,HIGH,CWE-20,
|
|
6881
|
+
GHSA-m5jp-p3r5-mfqp,2026-04-10T00:30:30Z,"Duplicate Advisory: OpenClaw: Gateway Plugin Subagent Fallback `deleteSession` Uses Synthetic `operator.admin`",openclaw,0,,2026.3.24,MODERATE,CWE-648;CWE-863,
|
|
6583
6882
|
GHSA-m5p4-7wf9-6w99,2020-09-01T21:10:53Z,"Malicious Package in regenrator",regenrator,0,,,CRITICAL,CWE-506,
|
|
6584
6883
|
GHSA-m5qc-5hw7-8vg7,2025-04-02T15:04:58Z,"image-size Denial of Service via Infinite Loop during Image Processing",image-size,1.1.0,1.2.1,,HIGH,CWE-770,
|
|
6585
6884
|
GHSA-m5qc-5hw7-8vg7,2025-04-02T15:04:58Z,"image-size Denial of Service via Infinite Loop during Image Processing",image-size,2.0.0,2.0.2,,HIGH,CWE-770,
|
|
@@ -6590,6 +6889,7 @@ GHSA-m6w8-fq7v-ph4m,2022-01-13T16:09:36Z,"GovernorCompatibilityBravo incorrect A
|
|
|
6590
6889
|
GHSA-m6w8-fq7v-ph4m,2022-01-13T16:09:36Z,"GovernorCompatibilityBravo incorrect ABI encoding may lead to unexpected behavior",@openzeppelin/contracts,4.3.0,4.4.2,,MODERATE,,
|
|
6591
6890
|
GHSA-m734-r4g6-34f9,2019-06-04T19:36:17Z,"NoSQL Injection in loopback-connector-mongodb","loopback-connector-mongodb",0,3.6.0,,HIGH,CWE-89,
|
|
6592
6891
|
GHSA-m794-qv59-gj7c,2020-09-03T17:03:22Z,"Malicious Package in signqle",signqle,0.0.0,,,CRITICAL,CWE-506,
|
|
6892
|
+
GHSA-m7mq-85xj-9x33,2026-04-16T21:22:36Z,"Flowise: Weak Default Token Hash Secret",flowise,0,3.1.0,,MODERATE,CWE-798,
|
|
6593
6893
|
GHSA-m7qm-r2r5-f77q,2020-09-01T20:43:48Z,"Cross-Site Scripting in react-marked-markdown",react-marked-markdown,0.0.0,,,HIGH,CWE-79,
|
|
6594
6894
|
GHSA-m852-866j-69j8,2020-09-01T20:47:01Z,"Malicious Package in eslint-config-airbnb-standard","eslint-config-airbnb-standard",2.0.0,2.1.0,,CRITICAL,CWE-506,
|
|
6595
6895
|
GHSA-m866-6qv5-p2fg,2026-03-31T23:57:00Z,"OpenClaw host-env blocklist missing `GIT_TEMPLATE_DIR` and `AWS_CONFIG_FILE` allows code execution via env override",openclaw,0,2026.3.28,,MODERATE,CWE-184,
|
|
@@ -6604,7 +6904,6 @@ GHSA-m9c9-mc2h-9wjw,2025-01-14T22:04:02Z,"Lodestar snappy checksum issue",@lodes
|
|
|
6604
6904
|
GHSA-m9hw-7xfv-wqg7,2020-11-12T19:36:14Z,"Prototype Pollution in json-logic-js",json-logic-js,0,2.0.0,,HIGH,CWE-471,
|
|
6605
6905
|
GHSA-m9r7-q9fc-qwx5,2020-09-03T17:22:24Z,"Malicious Package in maybemaliciouspackage",maybemaliciouspackage,0.0.0,,,CRITICAL,CWE-506,
|
|
6606
6906
|
GHSA-mc84-xr9p-938r,2019-09-23T18:31:05Z,"High severity vulnerability that affects generator-jhipster",generator-jhipster,0,6.3.1,,HIGH,CWE-494;CWE-829,
|
|
6607
|
-
GHSA-mf5g-6r6f-ghhm,2026-03-29T15:50:09Z,"OpenClaw: Synology Chat Webhook Pre-Auth Rate-Limit Bypass Enables Brute-Force Guessing of Webhook Token",openclaw,0,2026.3.28,,MODERATE,CWE-307;CWE-521,
|
|
6608
6907
|
GHSA-mf74-qq7w-6j7v,2024-02-03T00:38:22Z,"Zmarkdown Server-Side Request Forgery (SSRF) in remark-download-images",remark-images-download,0,3.1.0,,MODERATE,,
|
|
6609
6908
|
GHSA-mfc2-93pr-jf92,2020-10-01T17:10:15Z,"Malicious code in `loadyaml`",loadyaml,0,,1.0.2,CRITICAL,CWE-506,
|
|
6610
6909
|
GHSA-mfcp-34xw-p57x,2020-09-03T21:20:52Z,"Authentication Bypass in saml2-js",saml2-js,0,2.0.5,,MODERATE,CWE-287,
|
|
@@ -6623,17 +6922,16 @@ GHSA-mjjq-c88q-qhr6,2020-09-03T21:22:00Z,"Cross-Site Scripting in dompurify",dom
|
|
|
6623
6922
|
GHSA-mmph-wp49-r48h,2020-09-02T20:20:26Z,"Malicious Package in experss",experss,0,,,CRITICAL,CWE-506,
|
|
6624
6923
|
GHSA-mmqv-m45h-q2hp,2020-09-04T15:22:40Z,"Sandbox Breakout / Arbitrary Code Execution in localeval",localeval,0,15.3.0,,CRITICAL,,
|
|
6625
6924
|
GHSA-mp55-2274-4pj8,2020-09-03T21:54:09Z,"Malicious Package in buffer-xgr",buffer-xgr,0.0.0,,,CRITICAL,CWE-506,
|
|
6626
|
-
GHSA-mp66-rf4f-mhh8,2026-03-26T21:37:36Z,"OpenClaw: Google Chat app-url webhook auth accepted non-deployment add-on principals",openclaw,0,2026.3.22,,HIGH,CWE-863,
|
|
6627
6925
|
GHSA-mpcx-8qqw-rmcq,2020-08-19T21:51:20Z,"SQL Injection in waterline-sequel",waterline-sequel,0,0.5.1,,HIGH,,
|
|
6628
6926
|
GHSA-mpjf-8cmf-p789,2020-09-01T21:25:46Z,"Cross-Site Scripting in jingo",jingo,0,1.9.2,,HIGH,CWE-79,
|
|
6629
6927
|
GHSA-mq6v-w35g-3c97,2024-02-03T00:37:56Z,"Local File Inclusion vulnerability in zmarkdown",zmarkdown,0,10.1.3,,LOW,,
|
|
6630
6928
|
GHSA-mq9h-cwc2-6j5r,2020-09-03T17:42:27Z,"Malicious Package in midway-dataproxy",midway-dataproxy,0.0.0,,,CRITICAL,CWE-506,
|
|
6631
6929
|
GHSA-mqpr-49jj-32rc,2026-02-26T15:58:34Z,"n8n: Webhook Forgery on Github Webhook Trigger",n8n,0,1.123.15,,MODERATE,CWE-290,
|
|
6632
6930
|
GHSA-mqpr-49jj-32rc,2026-02-26T15:58:34Z,"n8n: Webhook Forgery on Github Webhook Trigger",n8n,2.0.0,2.5.0,,MODERATE,CWE-290,
|
|
6931
|
+
GHSA-mr34-9552-qr95,2026-04-17T22:33:09Z,"OpenClaw: Webchat media embedding enforces local-root containment for tool-result files",openclaw,2026.4.7,2026.4.15,,HIGH,CWE-22;CWE-73,
|
|
6633
6932
|
GHSA-mrr8-v49w-3333,2023-07-10T19:08:10Z,"sweetalert2 contains potentially undesirable behavior",sweetalert2,11.6.14,11.22.4,,LOW,CWE-440,
|
|
6634
6933
|
GHSA-mvch-rh6h-2m47,2020-09-11T21:10:29Z,"Malicious Package in equest",equest,0,,,CRITICAL,CWE-506,
|
|
6635
6934
|
GHSA-mvrp-3cvx-c325,2023-10-04T14:46:06Z,"Zod denial of service vulnerability during email validation",express-zod-api,0,10.0.0-beta1,,HIGH,CWE-1333,
|
|
6636
|
-
GHSA-mvv8-v4jj-g47j,2026-04-04T06:12:07Z,"Directus: Sensitive fields exposed in revision history",directus,0,11.17.0,,MODERATE,CWE-200;CWE-312,
|
|
6637
6935
|
GHSA-mvw6-62qv-vmqf,2025-07-25T06:30:30Z,"Duplicate Advisory: Koa Open Redirect via Referrer Header (User-Controlled)",koa,0,3.0.1,,LOW,CWE-601,
|
|
6638
6936
|
GHSA-mw7w-g3mg-xqm7,2026-03-27T22:32:06Z,"OpenClaw: BlueBubbles Group Reactions Bypass requireMention and Still Enqueue Agent-Visible System Events",openclaw,0,,2026.3.24,MODERATE,CWE-288;CWE-863,
|
|
6639
6937
|
GHSA-mwp6-j9wf-968c,2019-09-13T21:33:25Z,"Critical severity vulnerability that affects generator-jhipster",generator-jhipster,0,6.3.0,,CRITICAL,CWE-338,
|
|
@@ -6655,15 +6953,19 @@ GHSA-mxq6-vrrr-ppmg,2022-05-24T17:04:00Z,"Duplicate Advisory: tree-kill vulnerab
|
|
|
6655
6953
|
GHSA-p33q-w45h-2hcj,2020-09-02T18:30:03Z,"Malicious Package in 4equest",4equest,0,,,CRITICAL,CWE-506,
|
|
6656
6954
|
GHSA-p3jx-g34v-q56j,2020-09-03T22:54:02Z,"Malicious Package in j3-sha3",j3-sha3,0.0.0,,,CRITICAL,CWE-506,
|
|
6657
6955
|
GHSA-p464-m8x6-vhv8,2026-04-03T02:54:38Z,"OpenClaw: MS Teams webhook parses body before JWT validation, enabling unauthenticated resource exhaustion",openclaw,0,2026.3.31,,MODERATE,CWE-400,
|
|
6956
|
+
GHSA-p4h8-56qp-hpgv,2026-04-14T00:04:10Z,"SSH/SCP option injection allowing local RCE in @aiondadotcom/mcp-ssh",@aiondadotcom/mcp-ssh,0,1.3.5,,HIGH,CWE-78;CWE-88,
|
|
6658
6957
|
GHSA-p4mf-4qvh-w8g5,2020-09-04T15:41:42Z,"Malicious Package in bitcionjslib",bitcionjslib,0.0.0,,,CRITICAL,CWE-506,
|
|
6659
6958
|
GHSA-p4x4-2r7f-wjxg,2026-04-01T00:02:20Z,"OpenClaw gateway exec allow-always over-trusts positional carrier executables",openclaw,0,2026.3.28,,HIGH,CWE-863,
|
|
6660
6959
|
GHSA-p56r-jr4p-4wgh,2020-08-03T18:16:37Z,Withdrawn,whereis,0,0.4.1,,HIGH,,
|
|
6661
6960
|
GHSA-p5p2-rhc3-wmf3,2020-09-03T17:03:31Z,"Malicious Package in siganle",siganle,0.0.0,,,CRITICAL,CWE-506,
|
|
6662
6961
|
GHSA-p62r-jf56-h429,2020-09-03T20:29:58Z,"Malicious Package in evil-package",evil-package,0.0.0,,,CRITICAL,CWE-506,
|
|
6962
|
+
GHSA-p6j4-wvmc-vx2h,2026-04-10T00:30:30Z,"Duplicate Advisory: OpenClaw: Tlon cite expansion happens before channel and DM authorization is complete",openclaw,0,2026.3.22,,MODERATE,CWE-696,
|
|
6963
|
+
GHSA-p6x5-p4xf-cc4r,2026-04-17T22:31:45Z,"Remote Code Execution (RCE) via String Literal Injection into math-codegen",math-codegen,0,0.4.3,,CRITICAL,CWE-94,
|
|
6663
6964
|
GHSA-p72p-rjr2-r439,2019-05-29T20:24:02Z,"Server-Side Request Forgery in terriajs-server",terriajs-server,0,2.7.4,,HIGH,CWE-918,
|
|
6664
6965
|
GHSA-p77h-hv6g-fmfp,2020-09-03T20:43:16Z,"Sensitive Data Exposure in ibm_db",ibm_db,0,2.6.0,,MODERATE,,
|
|
6665
6966
|
GHSA-p7j5-4mwm-hv86,2021-05-06T17:28:14Z,"Duplicate Advisory: Cross-site scripting in TinyMCE",tinymce,0,4.9.7,,MODERATE,CWE-79,
|
|
6666
6967
|
GHSA-p7j5-4mwm-hv86,2021-05-06T17:28:14Z,"Duplicate Advisory: Cross-site scripting in TinyMCE",tinymce,5.0.0,5.1.4,,MODERATE,CWE-79,
|
|
6968
|
+
GHSA-p7mm-r948-4q3q,2026-04-16T22:48:46Z,"Paperclip: Approval decision attribution spoofing via client-controlled `decidedByUserId` in paperclip server",@paperclipai/server,0,2026.416.0,,MODERATE,CWE-345,
|
|
6667
6969
|
GHSA-p7qp-3fh7-pv4p,2020-09-03T22:24:04Z,"Malicious Package in buffur-xor",buffur-xor,0.0.0,,,CRITICAL,CWE-506,
|
|
6668
6970
|
GHSA-p8fm-w787-x6x3,2020-09-02T15:50:28Z,"Malicious Package in portionfatty12",portionfatty12,0.0.0,,,CRITICAL,CWE-506,
|
|
6669
6971
|
GHSA-p94w-42g3-f7h4,2020-03-06T01:16:00Z,"Holder can (re)create authentic credentials after receiving a credential in vp-toolkit",vp-toolkit,0,0.2.2,,HIGH,,
|
|
@@ -6675,17 +6977,20 @@ GHSA-pf56-h9qf-rxq4,2024-10-07T15:14:40Z,"Saltcorn Server Stored Cross-Site Scri
|
|
|
6675
6977
|
GHSA-pfq2-hh62-7m96,2026-01-13T19:54:29Z,"Renovate vulnerable to arbitrary command injection via Gradle Wrapper and malicious `distributionUrl`",renovate,32.124.0,42.68.5,,MODERATE,CWE-78,
|
|
6676
6978
|
GHSA-pfv5-rpcw-x34x,2026-03-19T03:30:57Z,"Duplicate Advisory: OpenClaw's allow-always wrapper persistence could bypass future approvals and enable command execution",openclaw,0,,,HIGH,CWE-78,
|
|
6677
6979
|
GHSA-pfv7-rr5m-qmv6,2026-03-03T21:42:27Z,"OpenClaw has auth inconsistency on local Browser Extension Relay /extension endpoint",openclaw,0,2026.2.19,,MODERATE,CWE-306,
|
|
6980
|
+
GHSA-pg8g-f2hf-x82m,2026-04-09T00:31:59Z,"Duplicate Advisory: OpenClaw: `fetchWithSsrFGuard` replays unsafe request bodies across cross-origin redirects",openclaw,0,2026.4.8,,HIGH,CWE-601,
|
|
6678
6981
|
GHSA-pg98-6v7f-2xfv,2022-11-23T15:44:52Z,"sweetalert2 v9.17.4 and above contains hidden functionality",sweetalert2,9.17.4,11.22.4,,LOW,CWE-912,
|
|
6679
6982
|
GHSA-pgcr-7wm4-mcv6,2019-06-04T15:42:45Z,"Sensitive Data Exposure in pem",pem,0,1.13.2,,CRITICAL,CWE-200,
|
|
6680
6983
|
GHSA-pgr8-jg6h-8gw6,2019-05-23T09:26:20Z,"Cross-Site Scripting in webpack-bundle-analyzer",webpack-bundle-analyzer,0,3.3.2,,MODERATE,CWE-79,
|
|
6681
6984
|
GHSA-pgv6-jrvv-75jp,2018-10-09T00:34:30Z,"Moderate severity vulnerability that affects send",send,0,0.8.4,,MODERATE,,
|
|
6682
6985
|
GHSA-pgx6-7jcq-2qff,2026-03-20T20:45:17Z,"PDFME has SSRF via Unvalidated URL Fetch in `getB64BasePdf` When `basePdf` Is Attacker-Controlled",@pdfme/common,0,5.5.10,,MODERATE,CWE-918,
|
|
6683
6986
|
GHSA-ph6w-f82w-28w6,2025-09-03T18:06:31Z,"Claude Code Vulnerable to Arbitrary Code Execution Due to Insufficient Startup Warning","@anthropic-ai/claude-code",0,1.0.87,,HIGH,CWE-94,
|
|
6987
|
+
GHSA-phgf-3849-rgjq,2026-03-31T12:31:35Z,"Duplicate Advisory: OpenClaw: Plugin subagent routes could bypass gateway authorization with synthetic admin scopes",openclaw,2026.3.7,2026.3.11,,CRITICAL,CWE-266,
|
|
6684
6988
|
GHSA-phph-xpj4-wvcv,2020-09-03T21:13:07Z,"Cross-Site Scripting in hexo-admin",hexo-admin,0.0.0,,,HIGH,CWE-79,
|
|
6685
6989
|
GHSA-pj97-j597-ppm7,2020-09-02T21:15:22Z,"Malicious Package in rqeuest",rqeuest,0,,,CRITICAL,CWE-506,
|
|
6686
6990
|
GHSA-pjvx-rx66-r3fg,2026-03-09T19:54:08Z,"OpenClaw: Cross-account sender authorization expansion in `/allowlist ... --store` account scoping",openclaw,0,2026.3.7,,MODERATE,CWE-639;CWE-863,
|
|
6687
6991
|
GHSA-pm52-wwrw-c282,2019-06-13T18:59:06Z,"Command Injection in wiki-plugin-datalog",wiki-plugin-datalog,0,0.1.6,,HIGH,CWE-94,
|
|
6688
6992
|
GHSA-pm9v-325f-5g74,2020-09-02T21:30:11Z,"Malicious Package in saync",saync,0,,,CRITICAL,CWE-506,
|
|
6993
|
+
GHSA-pmf3-2q63-jmp6,2026-04-10T00:30:30Z,"Duplicate Advisory: OpenClaw: Symlink Traversal via IDENTITY.md appendFile in agents.create/update (Incomplete Fix for CVE-2026-32013)",openclaw,0,,2026.2.22,MODERATE,CWE-61,
|
|
6689
6994
|
GHSA-pmgv-94f5-6w7w,2020-09-02T20:21:30Z,"Malicious Package in eact",eact,0,,,CRITICAL,CWE-506,
|
|
6690
6995
|
GHSA-ppwq-6v66-5m6j,2026-03-26T21:15:59Z,"OpenClaw Exposes Credentials Embedded in baseUrl Fields via config.get and channels.status",openclaw,0,2026.3.22,,MODERATE,CWE-200;CWE-212;CWE-522,
|
|
6691
6996
|
GHSA-pqhp-25j4-6hq9,2024-11-22T20:40:49Z,"smol-toml has a Denial of Service via malicious TOML document using deeply nested inline tables",smol-toml,0,1.3.1,,MODERATE,CWE-674,
|
|
@@ -6693,11 +6998,11 @@ GHSA-pqhr-mp3f-hrpp,2026-03-31T23:26:29Z,"Nuxt OG Image vulnerable to Server-Sid
|
|
|
6693
6998
|
GHSA-pqpp-2363-649v,2020-09-02T18:22:30Z,"Cross-Site Scripting in buttle",buttle,0,,,MODERATE,CWE-79,
|
|
6694
6999
|
GHSA-prmc-5v5w-c465,2021-04-06T17:32:38Z,"Client TLS credentials sent raw to server in npm package nats",nats,2.0.0-201,2.0.0-209,,CRITICAL,CWE-522,
|
|
6695
7000
|
GHSA-pv6r-vchh-cxg9,2020-09-03T20:42:09Z,"Denial of Service in apostrophe",apostrophe,0,2.97.1,,LOW,CWE-400,
|
|
6696
|
-
GHSA-pw7h-9g6p-c378,2026-03-26T21:30:54Z,"OpenClaw: Tlon settings empty-allowlist reconciliation bypassed intended revocation",openclaw,0,2026.3.22,,LOW,CWE-285;CWE-863,
|
|
6697
7001
|
GHSA-pxmp-fwjc-4x7q,2020-09-03T15:45:23Z,"HTML Injection in marky-markdown",marky-markdown,0.0.0,,,MODERATE,CWE-79,
|
|
6698
7002
|
GHSA-pxqp-mv67-g528,2020-09-03T21:38:34Z,"Malicious Package in bqffer-xor",bqffer-xor,0.0.0,,,CRITICAL,CWE-506,
|
|
6699
7003
|
GHSA-q2c6-c6pm-g3gh,2020-09-04T15:07:38Z,"Arbitrary Code Execution in handlebars",handlebars,0,3.0.8,,HIGH,,
|
|
6700
7004
|
GHSA-q2c6-c6pm-g3gh,2020-09-04T15:07:38Z,"Arbitrary Code Execution in handlebars",handlebars,4.0.0,4.5.3,,HIGH,,
|
|
7005
|
+
GHSA-q2gc-xjqw-qp89,2026-04-09T17:32:49Z,"OpenClaw: strictInlineEval explicit-approval boundary bypassed by approval-timeout fallback on gateway and node exec hosts",openclaw,0,2026.4.8,,MODERATE,CWE-20,
|
|
6701
7006
|
GHSA-q2qc-744p-66r2,2026-03-29T15:47:50Z,"OpenClaw: `session_status` sessionId resolution bypasses sandboxed session-tree visibility",openclaw,2026.3.11,2026.3.28,,HIGH,CWE-639;CWE-863,
|
|
6702
7007
|
GHSA-q324-q795-2q5p,2021-10-12T16:05:11Z,"Path traversal when using `preview-docs` when working dir contains files with question mark `?` in name",@redocly/openapi-cli,0,1.0.0-beta.59,,LOW,,
|
|
6703
7008
|
GHSA-q3w9-g74q-vp5f,2020-09-03T21:14:12Z,"Denial of Service in express-fileupload",express-fileupload,0,1.1.6-alpha.6,,LOW,,
|
|
@@ -6711,6 +7016,8 @@ GHSA-q42p-pg8m-cqh6,2019-06-05T14:07:48Z,"Prototype Pollution in handlebars",han
|
|
|
6711
7016
|
GHSA-q42p-pg8m-cqh6,2019-06-05T14:07:48Z,"Prototype Pollution in handlebars",handlebars,4.1.0,4.1.2,,HIGH,CWE-471,
|
|
6712
7017
|
GHSA-q4fm-pjq6-m63g,2026-03-27T18:05:47Z,"n8n has a Stored XSS Vulnerability in its Form Trigger",n8n,0,1.123.25,,MODERATE,CWE-79,
|
|
6713
7018
|
GHSA-q4fm-pjq6-m63g,2026-03-27T18:05:47Z,"n8n has a Stored XSS Vulnerability in its Form Trigger",n8n,2.0.0-rc.0,2.11.2,,MODERATE,CWE-79,
|
|
7019
|
+
GHSA-q4gf-8mx6-v5v3,2026-04-10T15:35:47Z,"Next.js has a Denial of Service with Server Components",next,13.0.0,15.5.15,,HIGH,CWE-770,
|
|
7020
|
+
GHSA-q4gf-8mx6-v5v3,2026-04-10T15:35:47Z,"Next.js has a Denial of Service with Server Components",next,16.0.0-beta.0,16.2.3,,HIGH,CWE-770,
|
|
6714
7021
|
GHSA-q4h9-46xg-m3x9,2021-09-15T20:22:13Z,"UUPSUpgradeable vulnerability in @openzeppelin/contracts-upgradeable","@openzeppelin/contracts-upgradeable",4.1.0,4.3.2,,CRITICAL,,
|
|
6715
7022
|
GHSA-q4pp-j36h-3gqg,2023-08-24T12:53:06Z,"Minimal `basti` IAM Policy Allows Shell Access",basti-cdk,0,1.0.1,,LOW,,
|
|
6716
7023
|
GHSA-q4xx-mc3q-23x8,2025-08-14T12:30:22Z,"Duplicate Advisory: Flowise vulnerable to RCE via Dynamic function constructor injection",flowise,0,,3.0.5,CRITICAL,CWE-94,
|
|
@@ -6727,7 +7034,6 @@ GHSA-q9r2-f3vc-rjg8,2020-08-19T22:28:51Z,"Command Injection in macaddress",macad
|
|
|
6727
7034
|
GHSA-q9w8-cf67-r238,2026-04-03T03:22:32Z,"OpenClaw: macOS Tailnet DNS Spoofing & Credential Exfiltration",openclaw,0,2026.3.31,,HIGH,CWE-346;CWE-350,
|
|
6728
7035
|
GHSA-q9wr-gcjc-hq52,2020-09-04T15:12:13Z,"Prototype Pollution in reggae",reggae,0.0.0,,,HIGH,CWE-1321,
|
|
6729
7036
|
GHSA-qc22-qwm9-j8rx,2021-12-20T16:59:31Z,"Remote Code Execution in npm-groovy-lint",npm-groovy-lint,0,9.1.0,,CRITICAL,CWE-20,
|
|
6730
|
-
GHSA-qc36-x95h-7j53,2026-03-13T15:48:05Z,"OpenClaw: Unrecognized script runners could bypass `system.run` approval integrity",openclaw,0,2026.3.11,,HIGH,CWE-863,
|
|
6731
7037
|
GHSA-qc59-cxj2-c2w4,2025-04-15T14:48:49Z,"aws-cdk-lib's aspect order change causes different Permissions Boundary assigned to Role",aws-cdk-lib,2.172.0,2.189.1,,LOW,CWE-279,
|
|
6732
7038
|
GHSA-qcc3-jqwp-5vh2,2026-04-02T21:01:08Z,"OpenClaw: LINE webhook handler lacks shared pre-auth concurrency budget before signature verification",openclaw,0,2026.3.31,,MODERATE,CWE-770,
|
|
6733
7039
|
GHSA-qcc4-p59m-p54m,2026-03-12T14:21:54Z,"OpenClaw: Sandbox dangling-symlink alias handling could bypass workspace-only write boundary",openclaw,0,2026.2.26,,HIGH,CWE-367;CWE-59,
|
|
@@ -6748,18 +7054,20 @@ GHSA-qj3p-xc97-xw74,2025-09-15T13:55:56Z,"MetaMask SDK indirectly exposed via ma
|
|
|
6748
7054
|
GHSA-qj3p-xc97-xw74,2025-09-15T13:55:56Z,"MetaMask SDK indirectly exposed via malicious debug@4.4.2 dependency",@metamask/sdk,0.16.0,0.33.1,,MODERATE,CWE-506,
|
|
6749
7055
|
GHSA-qj3p-xc97-xw74,2025-09-15T13:55:56Z,"MetaMask SDK indirectly exposed via malicious debug@4.4.2 dependency",@metamask/sdk-react,0.16.0,0.33.1,,MODERATE,CWE-506,
|
|
6750
7056
|
GHSA-qjfh-xc44-rm9x,2020-09-03T16:49:43Z,"Path Traversal in file-static-server",file-static-server,0.0.0,,,HIGH,CWE-22,
|
|
6751
|
-
GHSA-qm2m-28pf-hgjw,2026-03-27T22:30:57Z,"OpenClaw: Gateway Plugin HTTP Auth Grants Unrestricted operator.admin Runtime Scope to All Callers",openclaw,0,,2026.3.24,HIGH,CWE-266;CWE-863,
|
|
6752
7057
|
GHSA-qm4q-f956-fg64,2020-09-03T17:39:13Z,"Malicious Package in luna-mock",luna-mock,0.0.0,,,CRITICAL,CWE-506,
|
|
6753
7058
|
GHSA-qm7x-rc44-rrqw,2021-11-08T18:07:42Z,"Cross-site Scripting Vulnerability in GraphQL Playground (distributed by Apollo Server)",apollo-server,2.0.0,2.25.3,,HIGH,CWE-79,
|
|
6754
7059
|
GHSA-qm7x-rc44-rrqw,2021-11-08T18:07:42Z,"Cross-site Scripting Vulnerability in GraphQL Playground (distributed by Apollo Server)",apollo-server,3.0.0,3.4.1,,HIGH,CWE-79,
|
|
6755
|
-
GHSA-qm9x-v7cx-7rq4,2026-03-26T19:08:45Z,"OpenClaw's system.run allowlist can be bypassed through an unregistered time dispatch wrapper",openclaw,0,2026.3.22,,HIGH,CWE-863,
|
|
6756
7060
|
GHSA-qmgf-fp85-55gr,2020-09-04T15:40:34Z,"Malicious Package in bitcionjs",bitcionjs,0.0.0,,,CRITICAL,CWE-506,
|
|
6757
7061
|
GHSA-qmpg-8xg6-ph5q,2026-03-12T17:29:30Z,"Trix has a Stored XSS vulnerability through serialized attributes",trix,0,2.1.17,,MODERATE,CWE-79,
|
|
7062
|
+
GHSA-qmwg-qprg-3j38,2026-04-17T22:14:20Z,"OpenClaw: Browser interaction routes could pivot into local CDP and regain file reads",openclaw,0,2026.4.9,,MODERATE,CWE-693,
|
|
6758
7063
|
GHSA-qp6m-jqfr-2f7v,2020-09-04T15:27:11Z,"Malicious Package in babel-laoder",babel-laoder,0.0.0,,,CRITICAL,CWE-506,
|
|
6759
7064
|
GHSA-qpw2-xchm-655q,2022-01-06T20:31:01Z,"Out-of-Bounds read in stringstream",stringstream,0,0.0.6,,MODERATE,CWE-125,
|
|
6760
7065
|
GHSA-qq4x-c6h6-rfxh,2025-03-31T22:37:42Z,"aws-cdk-lib has Insertion of Sensitive Information into Log File vulnerability when using Cognito UserPoolClient Construct",aws-cdk-lib,2.37.0,2.187.0,,MODERATE,,
|
|
6761
7066
|
GHSA-qq6h-5g6j-q3cm,2022-11-23T15:26:43Z,"sweetalert2 v11.4.9 and above contains hidden functionality",sweetalert2,11.4.9,11.22.4,,LOW,CWE-912,
|
|
6762
7067
|
GHSA-qq9g-96v4-m3cj,2026-03-18T16:10:16Z,"Cross-Site Scripting (XSS) via Select Schema Option Value Injection in @pdfme/schemas",@pdfme/schemas,0,5.5.9,,MODERATE,CWE-79,
|
|
7068
|
+
GHSA-qqq7-4hxc-x63c,2026-04-09T17:32:58Z,"OpenClaw: Shared reply MEDIA - paths are treated as trusted and can trigger cross-channel local file exfiltration",openclaw,0,2026.4.8,,MODERATE,CWE-668,
|
|
7069
|
+
GHSA-qqvm-66q4-vf5c,2026-04-16T21:23:03Z,"Flowise: SSRF Protection Bypass via Direct node-fetch / axios Usage (Patch Enforcement Failure)",flowise,0,3.1.0,,MODERATE,CWE-918,
|
|
7070
|
+
GHSA-qqvm-66q4-vf5c,2026-04-16T21:23:03Z,"Flowise: SSRF Protection Bypass via Direct node-fetch / axios Usage (Patch Enforcement Failure)",flowise-components,0,3.1.0,,MODERATE,CWE-918,
|
|
6763
7071
|
GHSA-qr2g-p6q7-w82m,2026-03-07T02:37:47Z,"x402 SDK Security Advisory",@x402/svm,0,2.6.0,,HIGH,,
|
|
6764
7072
|
GHSA-qrg3-f6h6-vq8q,2020-08-19T22:15:57Z,"Denial of Service in https-proxy-agent",https-proxy-agent,0,2.2.0,,HIGH,,
|
|
6765
7073
|
GHSA-qrmm-w75w-3wpx,2021-12-09T19:08:38Z,"Server side request forgery in SwaggerUI",swagger-ui,0,4.1.3,,MODERATE,CWE-918,
|
|
@@ -6767,10 +7075,8 @@ GHSA-qrmm-w75w-3wpx,2021-12-09T19:08:38Z,"Server side request forgery in Swagger
|
|
|
6767
7075
|
GHSA-qrmm-w75w-3wpx,2021-12-09T19:08:38Z,"Server side request forgery in SwaggerUI",swagger-ui-react,0,4.1.3,,MODERATE,CWE-918,
|
|
6768
7076
|
GHSA-qv2g-99x4-45x6,2021-01-29T18:12:07Z,"Malicious npm package: discord-fix",discord-fix,0.0.0,,,CRITICAL,CWE-506,
|
|
6769
7077
|
GHSA-qv78-398w-cxp7,2020-09-11T21:08:19Z,"Malicious Package in shrugging-logging",shrugging-logging,0,,,CRITICAL,CWE-506,
|
|
6770
|
-
GHSA-qvr7-g57c-mrc7,2026-03-13T15:48:21Z,"OpenClaw: Unavailable local auth SecretRefs could fall through to remote credentials in local mode",openclaw,0,2026.3.11,,LOW,CWE-636,
|
|
6771
7078
|
GHSA-qwmf-95r9-gx9x,2026-03-21T03:31:13Z,"Duplicate Advisory: OpenClaw's gateway tokenless Tailscale auth applied to HTTP routes",openclaw,0,,,HIGH,CWE-290,
|
|
6772
7079
|
GHSA-qx4v-6gc5-f2vv,2019-06-20T14:32:56Z,"Regular Expression Denial of Service",esm,0,3.1.0,,MODERATE,CWE-400,
|
|
6773
|
-
GHSA-qxgf-hmcj-3xw3,2026-04-01T00:01:51Z,"OpenClaw affected by SSRF via unguarded image download in fal provider",openclaw,0,2026.3.28,,LOW,CWE-918,
|
|
6774
7080
|
GHSA-qxrj-x7rm-2h49,2020-09-03T17:05:59Z,"Malicious Package in dhkey",dhkey,0.0.0,,,CRITICAL,CWE-506,
|
|
6775
7081
|
GHSA-r294-2894-92j3,2026-03-03T22:09:26Z,"OpenClaw has stored XSS in exported session HTML viewer via markdown/raw-HTML rendering",openclaw,0,2026.2.23,,MODERATE,CWE-79,
|
|
6776
7082
|
GHSA-r2c6-8jc8-g32w,2026-02-02T00:30:23Z,"Duplicate Advisory: 1-Click RCE via Authentication Token Exfiltration From gatewayUrl",clawdbot,0,2026.1.29,,HIGH,CWE-669,
|
|
@@ -6779,14 +7085,17 @@ GHSA-r2rg-683g-ff96,2020-09-03T19:40:12Z,"Malicious Package in axios-http",axios
|
|
|
6779
7085
|
GHSA-r2vw-jgq9-jqx2,2020-09-03T15:54:11Z,"Improper Authorization in @sap-cloud-sdk/core",@sap-cloud-sdk/core,1.19.0,1.21.2,,HIGH,CWE-285,
|
|
6780
7086
|
GHSA-r32x-jhw5-g48p,2020-09-03T17:08:20Z,"Cross-Site Scripting in eco",eco,0.0.0,,,HIGH,CWE-79,
|
|
6781
7087
|
GHSA-r3hf-q8q7-fv2p,2023-08-09T12:51:51Z,"Angular critical CSS inlining Cross-site Scripting Vulnerability Advisory",@nguniversal/common,16.1.0,16.1.2,,HIGH,CWE-79,
|
|
7088
|
+
GHSA-r3v5-2grc-429h,2026-04-10T00:30:30Z,"Duplicate Advisory: OpenClaw Gateway: RCE and Privilege Escalation from operator.pairing to operator.admin via device.pair.approve",openclaw,0,2026.3.22,,HIGH,CWE-648,
|
|
6782
7089
|
GHSA-r3vq-92c6-3mqf,2023-02-16T15:30:28Z,"Duplicate advisory: Sequelize - Unsafe fall-through in getWhereConditions",@sequelize/core,0,7.0.0-alpha.20,,HIGH,CWE-843,
|
|
6783
7090
|
GHSA-r3xc-47qg-h929,2020-09-03T17:06:09Z,"Cross-Site Scripting in @ionic/core",@ionic/core,0,4.0.3,,HIGH,CWE-79,
|
|
6784
7091
|
GHSA-r3xc-47qg-h929,2020-09-03T17:06:09Z,"Cross-Site Scripting in @ionic/core",@ionic/core,4.1.0,4.1.3,,HIGH,CWE-79,
|
|
6785
7092
|
GHSA-r3xc-47qg-h929,2020-09-03T17:06:09Z,"Cross-Site Scripting in @ionic/core",@ionic/core,4.2.0,4.2.1,,HIGH,CWE-79,
|
|
6786
7093
|
GHSA-r3xc-47qg-h929,2020-09-03T17:06:09Z,"Cross-Site Scripting in @ionic/core",@ionic/core,4.3.0,4.3.1,,HIGH,CWE-79,
|
|
7094
|
+
GHSA-r4c2-gq3j-7rpj,2026-04-10T00:30:30Z,"Duplicate Advisory: OpenClaw: Telegram Webhook Missing Guess Rate Limiting Enables Brute-Force Guessing of Weak Webhook Secret",openclaw,0,,2026.3.24,MODERATE,CWE-307,
|
|
6787
7095
|
GHSA-r4m5-47cq-6qg8,2020-09-04T17:25:13Z,"Server-Side Request Forgery in ftp-srv",ftp-srv,1.0.0,2.19.6,,HIGH,CWE-918,
|
|
6788
7096
|
GHSA-r4m5-47cq-6qg8,2020-09-04T17:25:13Z,"Server-Side Request Forgery in ftp-srv",ftp-srv,3.0.0,3.1.2,,HIGH,CWE-918,
|
|
6789
7097
|
GHSA-r4m5-47cq-6qg8,2020-09-04T17:25:13Z,"Server-Side Request Forgery in ftp-srv",ftp-srv,4.0.0,4.3.4,,HIGH,CWE-918,
|
|
7098
|
+
GHSA-r4q5-vmmm-2653,2026-04-14T01:11:11Z,"follow-redirects leaks Custom Authentication Headers to Cross-Domain Redirect Targets",follow-redirects,0,1.16.0,,MODERATE,CWE-200,
|
|
6790
7099
|
GHSA-r587-7jh2-4qr3,2020-08-26T19:32:50Z,"Server secret was included in static assets and served to clients",flood,2.0.0,3.0.0,,CRITICAL,,
|
|
6791
7100
|
GHSA-r5w7-f542-q2j4,2025-01-28T20:37:26Z,"Potential DoS when using ContextLines integration","@sentry/google-cloud-serverless",8.10.0,8.49.0,,LOW,CWE-774,
|
|
6792
7101
|
GHSA-r5w7-f542-q2j4,2025-01-28T20:37:26Z,"Potential DoS when using ContextLines integration",@sentry/astro,8.10.0,8.49.0,,LOW,CWE-774,
|
|
@@ -6802,6 +7111,7 @@ GHSA-r5w7-f542-q2j4,2025-01-28T20:37:26Z,"Potential DoS when using ContextLines
|
|
|
6802
7111
|
GHSA-r5xw-q988-826m,2020-09-01T19:39:37Z,"Remote Memory Exposure in mongoose",mongoose,3.5.5,3.8.39,,MODERATE,CWE-201,
|
|
6803
7112
|
GHSA-r5xw-q988-826m,2020-09-01T19:39:37Z,"Remote Memory Exposure in mongoose",mongoose,4.0.0,4.3.6,,MODERATE,CWE-201,
|
|
6804
7113
|
GHSA-r742-7j4h-hjr8,2020-09-03T23:27:36Z,"Malicious Package in arsenic-tabasco-cyborg-peanut-butter","arsenic-tabasco-cyborg-peanut-butter",0.0.0,,,CRITICAL,CWE-506,
|
|
7114
|
+
GHSA-r77c-2cmr-7p47,2026-04-17T21:50:55Z,"OpenClaw: Delivery queue recovery could lose group tool-policy context for media replay",openclaw,2026.4.10,2026.4.14,,LOW,CWE-862,
|
|
6805
7115
|
GHSA-r7vr-gr74-94p8,2026-03-13T20:55:09Z,"OpenClaw: Command-authorized non-owners could reach owner-only `/config` and `/debug` surfaces",openclaw,0,2026.3.12,,HIGH,CWE-285,
|
|
6806
7116
|
GHSA-r849-826x-wgqm,2026-03-19T03:30:57Z,"Duplicate Advisory: Signal group allowlist authorization bypass via DM pairing-store leakage",openclaw,0,,,LOW,CWE-863,
|
|
6807
7117
|
GHSA-r863-p739-275c,2020-09-11T21:09:24Z,"Malicious Package in reuest",reuest,0,,,CRITICAL,CWE-506,
|
|
@@ -6809,43 +7119,48 @@ GHSA-r8hx-3qx6-hxq9,2020-09-03T19:41:14Z,"Malicious Package in commandre",comman
|
|
|
6809
7119
|
GHSA-r9cj-xj33-4q42,2020-09-03T22:21:54Z,"Malicious Package in buffgr-xor",buffgr-xor,0.0.0,,,CRITICAL,CWE-506,
|
|
6810
7120
|
GHSA-r9q4-w3fm-wrm2,2020-09-02T21:21:43Z,"Cross-Site Scripting in google-closure-library",google-closure-library,0,20190301.0.0,,MODERATE,CWE-79,
|
|
6811
7121
|
GHSA-rc4v-99cr-pjcm,2023-10-17T14:21:16Z,"Prototype Pollution in ali-security/mongoose","@seal-security/mongoose-fixed",5.3.3,5.3.4,,CRITICAL,CWE-1321,
|
|
7122
|
+
GHSA-rc8f-r29c-chr6,2026-04-10T00:30:29Z,"Duplicate Advisory: OpenClaw: BlueBubbles Webhook Missing Rate Limiting Enables Brute-Force Password Guessing",openclaw,0,,2026.3.24,MODERATE,CWE-307,
|
|
6812
7123
|
GHSA-rch7-f4h5-x9rj,2019-08-23T00:04:52Z,"Identity Spoofing in libp2p-secio",libp2p-secio,0,0.9.0,,CRITICAL,CWE-290,
|
|
6813
7124
|
GHSA-rchv-x836-w7xp,2026-03-09T19:52:29Z,"OpenClaw's dashboard leaked gateway auth material via browser URL/query and localStorage",openclaw,0,2026.3.7,,HIGH,CWE-200,
|
|
6814
7125
|
GHSA-rcv7-4w2m-gj9v,2020-09-03T23:24:26Z,"Malicious Package in sj-tw-test-security",sj-tw-test-security,0.0.0,,,CRITICAL,CWE-506,
|
|
6815
7126
|
GHSA-rcx4-77x4-hjx5,2026-03-21T03:31:15Z,"Duplicate Advisory: OpenClaw ACP client has permission auto-approval bypass via untrusted tool metadata",openclaw,0,,2026.2.22-2,MODERATE,CWE-807,
|
|
6816
|
-
GHSA-
|
|
7127
|
+
GHSA-rf75-g96h-j3rm,2026-04-02T21:32:52Z,"Duplicate Advisory: OpenClaw's complex interpreter pipelines could skip exec script preflight validation",openclaw,0,2026.4.2,,MODERATE,CWE-184,
|
|
6817
7128
|
GHSA-rffp-mc78-wjf7,2020-09-02T18:26:48Z,"Command Injection in cocos-utils",cocos-utils,0,,,HIGH,CWE-77,
|
|
6818
7129
|
GHSA-rfqg-qgf8-xr9x,2026-04-03T03:11:33Z,"OpenClaw: Gateway `device.token.rotate` does not terminate active WebSocket sessions after credential rotation",openclaw,0,2026.3.31,,LOW,CWE-613,
|
|
6819
7130
|
GHSA-rg8m-3943-vm6q,2026-04-02T21:00:44Z,"OpenClaw: Matrix thread root and reply context bypass sender allowlist",openclaw,0,2026.3.31,,LOW,CWE-863,
|
|
6820
7131
|
GHSA-rggq-f2wf-m6cp,2020-09-02T18:31:08Z,"Malicious Package in jajajejejiji",jajajejejiji,0,,,CRITICAL,CWE-506,
|
|
7132
|
+
GHSA-rh7v-6w34-w2rr,2026-04-16T21:49:28Z,"Flowise: File Upload Validation Bypass in createAttachment",flowise,0,3.1.0,,HIGH,CWE-434,
|
|
6821
7133
|
GHSA-rhc3-76jw-4f2x,2020-09-04T17:58:46Z,"Denial of Service in @commercial/ammo",@commercial/ammo,0,2.1.1,,HIGH,,
|
|
6822
|
-
GHSA-
|
|
7134
|
+
GHSA-rj2p-j66c-mgqh,2026-04-17T22:01:57Z,"OpenClaw: Browser tabs action select and close routes bypassed SSRF policy",openclaw,0,2026.4.10,,MODERATE,CWE-918,
|
|
6823
7135
|
GHSA-rj39-33v7-9xrq,2026-03-21T03:31:14Z,"Duplicate Advisory: OpenClaw's shell startup env injection bypasses system.run allowlist intent (RCE class)",openclaw,0,,,HIGH,CWE-78,
|
|
6824
7136
|
GHSA-rjhc-w3fj-j6x9,2020-09-03T17:32:45Z,"Malicious Package in alipayjsapi",alipayjsapi,0.0.0,,,CRITICAL,CWE-506,
|
|
6825
7137
|
GHSA-rjvj-673q-4hfw,2020-09-04T17:54:31Z,"Command Injection in traceroute",traceroute,0.0.0,,,CRITICAL,CWE-77,
|
|
6826
|
-
GHSA-rm59-992w-x2mv,2026-03-26T19:50:41Z,"OpenClaw is vulnerable to unauthenticated resource exhaustion through its voice call webhook handling",openclaw,0,2026.3.22,,MODERATE,CWE-400,
|
|
6827
7138
|
GHSA-rm5c-4rmf-vvhw,2026-04-03T03:01:57Z,"OpenClaw: Sandbox file operations use check-then-act, bypassing fd-based TOCTOU defenses",openclaw,0,2026.3.31,,MODERATE,CWE-367,
|
|
6828
7139
|
GHSA-rm7c-x424-g2mw,2020-09-02T18:36:31Z,"Malicious Package in asyync",asyync,0,,,CRITICAL,CWE-506,
|
|
6829
7140
|
GHSA-rmmc-8cqj-hfp3,2020-09-03T18:24:43Z,"Authentication Bypass in otpauth",otpauth,0,3.2.8,,HIGH,CWE-287,
|
|
7141
|
+
GHSA-rp42-5vxx-qpwr,2026-04-16T21:37:48Z,"basic-ftp vulnerable to denial of service via unbounded memory consumption in Client.list()",basic-ftp,0,5.3.0,,HIGH,CWE-400;CWE-770,
|
|
6830
7142
|
GHSA-rqgv-292v-5qgr,2024-04-23T16:21:09Z,"Renovate vulnerable to arbitrary command injection via helmv3 manager and registryAliases",renovate,37.158.0,37.199.0,,MODERATE,CWE-78,
|
|
6831
|
-
GHSA-
|
|
7143
|
+
GHSA-rr7j-v2q5-chgv,2026-04-16T01:20:37Z,"LangSmith SDK: Streaming token events bypass output redaction",langsmith,0,0.5.19,,MODERATE,CWE-200;CWE-359;CWE-532,
|
|
6832
7144
|
GHSA-rrqv-vjrw-hrcr,2021-05-26T19:59:19Z,"Arbitrary Code Execution in json-ptr",json-ptr,0,2.1.0,,HIGH,CWE-74,
|
|
6833
7145
|
GHSA-rrvm-gqq8-q2wx,2020-09-03T21:05:26Z,"Malicious Package in require-port",require-port,0.0.0,,,CRITICAL,CWE-506,
|
|
6834
7146
|
GHSA-rv49-54qp-fw42,2019-06-06T15:30:20Z,"Path Traversal in servey",servey,0,3.1.0,,MODERATE,CWE-22,
|
|
6835
7147
|
GHSA-rv6q-p3x7-43fx,2020-09-04T16:37:50Z,"Malicious Package in bitcoimjs-lib",bitcoimjs-lib,0.0.0,,,CRITICAL,CWE-506,
|
|
6836
7148
|
GHSA-rvg8-pwq2-xj7q,2020-09-01T20:42:44Z,"Out-of-bounds Read in base64url",base64url,0,3.0.0,,MODERATE,CWE-125,
|
|
6837
|
-
GHSA-rvqr-hrcc-j9vv,2026-03-26T19:50:24Z,"OpenClaw: Bonjour/DNS-SD TXT metadata steers CLI routing after failed service resolution",openclaw,0,2026.3.22,,MODERATE,CWE-345;CWE-642,
|
|
6838
7149
|
GHSA-rvvf-6vh3-9j43,2026-04-03T03:23:36Z,"OpenClaw: Discord Slash Commands Bypass Group DM Channel Allowlist",openclaw,0,2026.3.31,,MODERATE,CWE-863,
|
|
6839
7150
|
GHSA-rvww-x6m4-4vc2,2020-09-11T21:12:39Z,"Malicious Package in blubird",blubird,0,,,CRITICAL,CWE-506,
|
|
6840
|
-
GHSA-rw39-5899-8mxp,2026-03-13T15:47:46Z,"OpenClaw: Node-host approvals could show misleading shell payloads instead of the executed argv",openclaw,0,2026.3.11,,HIGH,CWE-436;CWE-863,
|
|
6841
7151
|
GHSA-rw4r-h883-8pf9,2020-09-02T20:30:02Z,"Malicious Package in reequest",reequest,0,,,CRITICAL,CWE-506,
|
|
6842
7152
|
GHSA-rw53-q8x7-ccx8,2020-09-03T21:55:17Z,"Malicious Package in buffer-xkr",buffer-xkr,0.0.0,,,CRITICAL,CWE-506,
|
|
6843
7153
|
GHSA-rwcq-qpm6-7867,2020-09-03T17:04:32Z,"Malicious Package in riped160",riped160,0.0.0,,,CRITICAL,CWE-506,
|
|
6844
7154
|
GHSA-rwmv-c7v8-v9vf,2020-09-04T16:36:45Z,"Malicious Package in bitcoimd-rpc",bitcoimd-rpc,0.0.0,,,CRITICAL,CWE-506,
|
|
7155
|
+
GHSA-rwwx-25m7-ww73,2026-03-29T15:30:19Z,"Duplicate Advisory: OpenClaw: Unrecognized script runners could bypass `system.run` approval integrity",openclaw,0,2026.3.12,,CRITICAL,CWE-863,
|
|
7156
|
+
GHSA-rxmx-g7hr-8mx4,2026-04-07T18:15:59Z,"OpenClaw: Zalo replay dedupe keys could suppress messages across chats or senders",openclaw,0,2026.4.2,,MODERATE,CWE-349;CWE-440,
|
|
6845
7157
|
GHSA-v2p6-4mp7-3r9v,2019-06-14T16:26:22Z,"Regular Expression Denial of Service in underscore.string",underscore.string,0,3.3.5,,MODERATE,CWE-400,
|
|
7158
|
+
GHSA-v38x-c887-992f,2026-04-18T00:46:04Z,"Flowise: Airtable_Agent Code Injection Remote Code Execution Vulnerability",flowise,0,3.1.0,,CRITICAL,CWE-184,
|
|
7159
|
+
GHSA-v38x-c887-992f,2026-04-18T00:46:04Z,"Flowise: Airtable_Agent Code Injection Remote Code Execution Vulnerability",flowise-components,0,3.1.0,,CRITICAL,CWE-184,
|
|
6846
7160
|
GHSA-v3qc-wrwx-j3pw,2026-04-03T03:03:18Z,"OpenClaw: Agentic Consent Bypass — LLM Agent Can Silently Disable Exec Approval via `config.patch`",openclaw,0,2026.3.28,,HIGH,CWE-285,
|
|
6847
7161
|
GHSA-v3rj-xjv7-4jmq,2026-03-25T21:03:56Z,"smol-toml: Denial of Service via TOML documents containing thousands of consecutive commented lines",smol-toml,0,1.6.1,,MODERATE,CWE-674,
|
|
6848
7162
|
GHSA-v3wr-67px-44xg,2022-03-03T19:11:14Z,"Execution with Unnecessary Privileges in arc-electron","@advanced-rest-client/base",0,0.1.10,,HIGH,,
|
|
7163
|
+
GHSA-v457-wxvj-p9w9,2026-04-10T15:36:00Z,"@vitejs/plugin-rsc has a Denial of Service with React Server Components",@vitejs/plugin-rsc,0,0.5.23,,HIGH,CWE-400,
|
|
6849
7164
|
GHSA-v45m-2wcp-gg98,2020-09-04T17:18:44Z,"Global node_modules Binary Overwrite in bin-links",bin-links,0,1.1.6,,LOW,,
|
|
6850
7165
|
GHSA-v4x8-gw49-7hv4,2020-09-03T20:37:42Z,"Path Traversal in swagger-injector",swagger-injector,0.0.0,,,CRITICAL,CWE-22,
|
|
6851
7166
|
GHSA-v66p-w7qx-wv98,2020-09-04T17:29:34Z,"Authentication Bypass in express-laravel-passport",express-laravel-passport,0.0.0,,,CRITICAL,CWE-287,
|
|
@@ -6860,22 +7175,25 @@ GHSA-v8w9-8mx6-g223,2026-03-11T00:31:47Z,"Hono vulnerable to Prototype Pollution
|
|
|
6860
7175
|
GHSA-v95x-h953-x7fg,2020-09-03T19:47:55Z,"Malicious Package in k0a_multer",k0a_multer,0.0.0,,,CRITICAL,CWE-506,
|
|
6861
7176
|
GHSA-v99v-xgjx-7m7g,2020-09-02T18:40:47Z,"Malicious Package in asnyc",asnyc,0,,,CRITICAL,CWE-506,
|
|
6862
7177
|
GHSA-v9wp-8r97-v6xg,2020-09-03T17:17:00Z,"Cross-Site Scripting in jquery.json-viewer",jquery.json-viewer,0,1.3.0,,HIGH,CWE-79,
|
|
7178
|
+
GHSA-vc32-h5mq-453v,2026-04-09T17:34:33Z,"OpenClaw: /allowlist omits owner-only enforcement for cross-channel allowlist writes",openclaw,0,2026.4.8,,MODERATE,,
|
|
6863
7179
|
GHSA-vc6r-4x6g-mmqc,2019-06-11T16:16:23Z,"Path Traversal in m-server",m-server,0,1.4.2,,MODERATE,CWE-22,
|
|
6864
7180
|
GHSA-vcg5-9xw6-r56c,2020-09-02T21:40:49Z,"Malicious Package in logsymbles",logsymbles,0,,,CRITICAL,CWE-506,
|
|
6865
|
-
GHSA-vcx4-4qxg-mfp4,2026-03-27T22:37:35Z,"OpenClaw: Telegram Webhook Missing Guess Rate Limiting Enables Brute-Force Guessing of Weak Webhook Secret",openclaw,0,,2026.3.24,MODERATE,CWE-307;CWE-521,
|
|
6866
7181
|
GHSA-vf5m-q45w-8mh9,2020-09-03T23:00:25Z,"Malicious Package in js-qha3",js-qha3,0.0.0,,,CRITICAL,CWE-506,
|
|
6867
7182
|
GHSA-vf8q-pw7h-r2x2,2020-09-11T21:15:54Z,"Malicious Package in epress",epress,0,,,CRITICAL,CWE-506,
|
|
6868
|
-
GHSA-
|
|
7183
|
+
GHSA-vfp4-8x56-j7c5,2026-04-17T21:54:20Z,"OpenClaw: Exec environment denylist missed high-risk interpreter startup variables",openclaw,0,2026.4.10,,HIGH,CWE-184,
|
|
7184
|
+
GHSA-vfw7-6rhc-6xxg,2026-04-07T18:10:52Z,"OpenClaw Has Incomplete Fix for CVE-2026-4039: CLI Backend Environment Variable Injection via Workspace Config",openclaw,0,2026.3.24,,HIGH,CWE-426,
|
|
6869
7185
|
GHSA-vg44-fw64-cpjx,2020-03-24T15:08:59Z,"Incorrect Account Used for Signing","@metamask/eth-ledger-bridge-keyring",0,0.2.2,,HIGH,CWE-287,
|
|
6870
7186
|
GHSA-vg44-fw64-cpjx,2020-03-24T15:08:59Z,"Incorrect Account Used for Signing","eth-ledger-bridge-keyring",0,0.2.1,,HIGH,CWE-287,
|
|
6871
7187
|
GHSA-vh4c-j2xv-9pv9,2026-03-21T03:31:15Z,"Duplicate Advisory: OpenClaw: BlueBubbles beta plugin webhook auth hardening (remove passwordless fallback)",openclaw,0,,,MODERATE,CWE-306,
|
|
6872
7188
|
GHSA-vh4h-fvqf-q9wv,2025-05-01T03:31:17Z,"Duplicate Advisory: @cloudflare/workers-oauth-provider PKCE bypass via downgrade attack","@cloudflare/workers-oauth-provider",0,0.0.5,,MODERATE,CWE-287,
|
|
6873
7189
|
GHSA-vh5j-5fhq-9xwg,2025-06-27T22:06:48Z,"Taylor has race condition in /get-patch that allows purchase token replay",taylored,0,8.1.3,,LOW,CWE-362,
|
|
6874
|
-
GHSA-vhwf-4x96-vqx2,2026-03-12T14:21:32Z,"OpenClaw's skills-install-download can be redirected outside the tools root by rebinding the validated base path",openclaw,0,2026.3.8,,MODERATE,CWE-367,
|
|
6875
7190
|
GHSA-vj2p-7pgw-g2wf,2026-03-27T15:46:53Z,"Postiz App has a High-Severity SSRF Vulnerability via Next.js",postiz,0,,2.0.12,HIGH,CWE-1395;CWE-918,
|
|
6876
7191
|
GHSA-vjf3-2gpj-233v,2026-02-26T22:45:13Z,"n8n has an SSO Enforcement Bypass in its Self-Service Settings API",n8n,0,2.8.0,,MODERATE,CWE-269;CWE-284;CWE-287,
|
|
6877
7192
|
GHSA-vjh7-7g9h-fjfh,2025-02-12T19:47:52Z,"Elliptic's private key extraction in ECDSA upon signing a malformed input (e.g. a string)",elliptic,0,6.6.1,,CRITICAL,CWE-200,
|
|
7193
|
+
GHSA-vjqw-w5jr-g9w5,2026-03-29T15:30:19Z,"Duplicate Advisory: OpenClaw: Feishu webhook mode accepted forged events when only `verificationToken` was configured",openclaw,0,2026.3.12,,HIGH,CWE-347,
|
|
6878
7194
|
GHSA-vjvw-wcmw-pr26,2020-09-04T17:37:08Z,"Insufficient Entropy in parsel",parsel,0.0.0,,,CRITICAL,CWE-331,
|
|
7195
|
+
GHSA-vjx8-8p7h-82gr,2026-04-07T18:10:45Z,"OpenClaw: Marketplace Plugin Download Follows Redirects Without SSRF Protection",openclaw,0,2026.3.31,,MODERATE,CWE-918,
|
|
7196
|
+
GHSA-vm29-7mq3-9jrg,2026-03-31T12:31:35Z,"Duplicate Advisory: OpenClaw: Unavailable local auth SecretRefs could fall through to remote credentials in local mode",OpenClaw,0,2026.3.11,,LOW,CWE-636,
|
|
6879
7197
|
GHSA-vm67-mh96-95mq,2020-09-03T21:40:48Z,"Malicious Package in bubfer-xor",bubfer-xor,0.0.0,,,CRITICAL,CWE-506,
|
|
6880
7198
|
GHSA-vm6v-w6q2-mrrq,2020-09-03T19:20:05Z,"Malicious Package in bb-builder",bb-builder,0.0.0,,,CRITICAL,CWE-506,
|
|
6881
7199
|
GHSA-vm7j-4rj6-mw2p,2020-09-03T21:08:42Z,"Malicious Package in ember_cli_babe",ember_cli_babe,0.0.0,,,CRITICAL,CWE-506,
|
|
@@ -6888,8 +7206,20 @@ GHSA-vpgc-7h78-gx8f,2020-09-04T18:05:14Z,"personnummer/js vulnerable to Improper
|
|
|
6888
7206
|
GHSA-vpj4-89q8-rh38,2020-09-03T18:16:59Z,"Cross-Site Scripting in bpmn-js-properties-panel",bpmn-js-properties-panel,0,0.31.0,,HIGH,CWE-79,
|
|
6889
7207
|
GHSA-vpq5-4rc8-c222,2019-06-05T14:10:45Z,"Denial of Service in canvas",canvas,0,1.6.10,,MODERATE,,
|
|
6890
7208
|
GHSA-vqvg-86cc-cg83,2026-03-30T18:59:16Z,"OpenClaw: Mutating internal `/allowlist` chat commands missed `operator.admin` scope enforcement",openclaw,0,2026.3.24,,MODERATE,CWE-862,
|
|
7209
|
+
GHSA-vqx2-fgx2-5wq9,2026-04-16T21:28:26Z,"Official Clerk JavaScript SDKs: Middleware-based route protection bypass",@clerk/astro,"2.0.0-snapshot.v20241206174604",2.17.10,,CRITICAL,CWE-436;CWE-863,
|
|
7210
|
+
GHSA-vqx2-fgx2-5wq9,2026-04-16T21:28:26Z,"Official Clerk JavaScript SDKs: Middleware-based route protection bypass",@clerk/astro,0.0.1,1.5.7,,CRITICAL,CWE-436;CWE-863,
|
|
7211
|
+
GHSA-vqx2-fgx2-5wq9,2026-04-16T21:28:26Z,"Official Clerk JavaScript SDKs: Middleware-based route protection bypass",@clerk/astro,3.0.0,3.0.15,,CRITICAL,CWE-436;CWE-863,
|
|
7212
|
+
GHSA-vqx2-fgx2-5wq9,2026-04-16T21:28:26Z,"Official Clerk JavaScript SDKs: Middleware-based route protection bypass",@clerk/nextjs,5.0.0,5.7.6,,CRITICAL,CWE-436;CWE-863,
|
|
7213
|
+
GHSA-vqx2-fgx2-5wq9,2026-04-16T21:28:26Z,"Official Clerk JavaScript SDKs: Middleware-based route protection bypass",@clerk/nextjs,6.0.0-snapshot.vb87a27f,6.39.2,,CRITICAL,CWE-436;CWE-863,
|
|
7214
|
+
GHSA-vqx2-fgx2-5wq9,2026-04-16T21:28:26Z,"Official Clerk JavaScript SDKs: Middleware-based route protection bypass",@clerk/nextjs,7.0.0,7.2.1,,CRITICAL,CWE-436;CWE-863,
|
|
7215
|
+
GHSA-vqx2-fgx2-5wq9,2026-04-16T21:28:26Z,"Official Clerk JavaScript SDKs: Middleware-based route protection bypass",@clerk/nuxt,1.1.0,1.13.28,,CRITICAL,CWE-436;CWE-863,
|
|
7216
|
+
GHSA-vqx2-fgx2-5wq9,2026-04-16T21:28:26Z,"Official Clerk JavaScript SDKs: Middleware-based route protection bypass",@clerk/nuxt,2.0.0,2.2.2,,CRITICAL,CWE-436;CWE-863,
|
|
7217
|
+
GHSA-vqx2-fgx2-5wq9,2026-04-16T21:28:26Z,"Official Clerk JavaScript SDKs: Middleware-based route protection bypass",@clerk/shared,"3.0.0-canary.v20250225091530",3.47.4,,CRITICAL,CWE-436;CWE-863,
|
|
7218
|
+
GHSA-vqx2-fgx2-5wq9,2026-04-16T21:28:26Z,"Official Clerk JavaScript SDKs: Middleware-based route protection bypass",@clerk/shared,2.20.17,2.22.1,,CRITICAL,CWE-436;CWE-863,
|
|
7219
|
+
GHSA-vqx2-fgx2-5wq9,2026-04-16T21:28:26Z,"Official Clerk JavaScript SDKs: Middleware-based route protection bypass",@clerk/shared,4.0.0,4.8.1,,CRITICAL,CWE-436;CWE-863,
|
|
7220
|
+
GHSA-vr5g-mmx7-h897,2026-04-09T17:36:48Z,"OpenClaw has Browser SSRF Policy Bypass via Interaction-Triggered Navigation",openclaw,0,2026.4.8,,MODERATE,CWE-918,
|
|
6891
7221
|
GHSA-vr6p-vq2p-6j74,2025-12-15T22:00:17Z,"Withdrawn Advisory: LikeC4 has RCE through vulnerable React and Next.js versions",likec4,0,,1.46.1,CRITICAL,CWE-502,
|
|
6892
|
-
GHSA-
|
|
7222
|
+
GHSA-vr7g-88fq-vhq3,2026-04-16T22:48:09Z,"Paperclip: OS Command Injection via Execution Workspace cleanupCommand",@paperclipai/server,0,2026.416.0,,CRITICAL,CWE-78,
|
|
6893
7223
|
GHSA-vrhm-gvg7-fpcf,2026-02-19T20:29:42Z," Memory exhaustion in SvelteKit remote form deserialization (experimental only)",@sveltejs/kit,2.49.0,2.52.2,,MODERATE,CWE-770,
|
|
6894
7224
|
GHSA-vrqm-gvq7-rrwh,2026-03-20T20:44:52Z,"PDFME Affected by Decompression Bomb in FlateDecode Stream Parsing Causes Memory Exhaustion DoS",@pdfme/pdf-lib,0,5.5.10,,MODERATE,CWE-409,
|
|
6895
7225
|
GHSA-vrxj-4qhw-5vwq,2020-09-03T17:03:41Z,"Malicious Package in scryptys",scryptys,0.0.0,,,CRITICAL,CWE-506,
|
|
@@ -6897,6 +7227,8 @@ GHSA-vv52-3mrp-455m,2020-09-03T15:53:36Z,"Malicious Package in m-backdoor",m-bac
|
|
|
6897
7227
|
GHSA-vv7g-pjw9-4qj9,2020-09-03T17:03:56Z,"Malicious Package in scrytsy",scrytsy,0.0.0,,,CRITICAL,CWE-506,
|
|
6898
7228
|
GHSA-vvfh-mvjv-w38q,2020-09-04T15:28:19Z,"Malicious Package in babel-loadre",babel-loadre,0.0.0,,,CRITICAL,CWE-506,
|
|
6899
7229
|
GHSA-vvjh-f6p9-5vcf,2026-03-04T19:17:36Z,"OpenClaw Canvas Authentication Bypass Vulnerability",openclaw,0,2026.2.19,,HIGH,CWE-291,
|
|
7230
|
+
GHSA-vvjj-xcjg-gr5g,2026-04-08T15:05:20Z,"Nodemailer Vulnerable to SMTP Command Injection via CRLF in Transport name Option (EHLO/HELO) ",nodemailer,0,8.0.5,,MODERATE,CWE-93,
|
|
7231
|
+
GHSA-vw3h-q6xq-jjm5,2026-04-17T21:48:36Z,"OpenClaw: Voice-call realtime WebSocket accepted oversized frames",openclaw,2026.4.9,2026.4.10,,HIGH,CWE-400;CWE-770,
|
|
6900
7232
|
GHSA-vw7g-jq9m-3q9v,2020-09-02T18:23:35Z,"Unauthorized File Access in glance",glance,0,3.0.7,,MODERATE,,
|
|
6901
7233
|
GHSA-vx5f-vmr6-32wf,2026-02-10T14:33:50Z,"cap-go/capacitor-native-biometric Authentication Bypass","@capgo/capacitor-native-biometric",0,8.3.6,,MODERATE,CWE-287,
|
|
6902
7234
|
GHSA-vx5w-cxch-wwc9,2020-09-03T19:02:27Z,"Path Traversal in f-serv",f-serv,0.0.0,,,CRITICAL,CWE-22,
|
|
@@ -6933,6 +7265,7 @@ GHSA-w42g-7vfc-xf37,2020-06-05T19:38:14Z,"Introspection in schema validation in
|
|
|
6933
7265
|
GHSA-w42g-7vfc-xf37,2020-06-05T19:38:14Z,"Introspection in schema validation in Apollo Server",apollo-server-koa,0,2.14.2,,MODERATE,,
|
|
6934
7266
|
GHSA-w42g-7vfc-xf37,2020-06-05T19:38:14Z,"Introspection in schema validation in Apollo Server",apollo-server-lambda,0,2.14.2,,MODERATE,,
|
|
6935
7267
|
GHSA-w42g-7vfc-xf37,2020-06-05T19:38:14Z,"Introspection in schema validation in Apollo Server",apollo-server-micro,0,2.14.2,,MODERATE,,
|
|
7268
|
+
GHSA-w47f-j8rh-wx87,2026-04-17T21:34:30Z,"Flowise: Public chatflow endpoints return unsanitized flowData including plaintext API keys, passwords, and credential IDs",flowise,0,3.1.0,,HIGH,,
|
|
6936
7269
|
GHSA-w48f-fwg7-ww6p,2026-04-04T04:24:27Z,"@stablelib/cbor: Prototype poisoning via `__proto__` map keys in CBOR decoding",@stablelib/cbor,0,2.0.3,,HIGH,CWE-1321,
|
|
6937
7270
|
GHSA-w4hv-vmv9-hgcr,2024-02-16T19:29:31Z,"GitHub Security Lab (GHSL) Vulnerability Report, scrypted: `GHSL-2023-218`, `GHSL-2023-219`",@scrypted/core,0,,0.1.142,HIGH,,
|
|
6938
7271
|
GHSA-w4hv-vmv9-hgcr,2024-02-16T19:29:31Z,"GitHub Security Lab (GHSL) Vulnerability Report, scrypted: `GHSL-2023-218`, `GHSL-2023-219`",@scrypted/server,0,,0.56.0,HIGH,,
|
|
@@ -6945,16 +7278,22 @@ GHSA-w673-8fjw-457c,2026-03-27T18:06:28Z,"n8n: Authenticated XSS and Open Redire
|
|
|
6945
7278
|
GHSA-w673-8fjw-457c,2026-03-27T18:06:28Z,"n8n: Authenticated XSS and Open Redirect via Form Node",n8n,2.0.0-rc.0,2.10.4,,MODERATE,CWE-601;CWE-79,
|
|
6946
7279
|
GHSA-w673-8fjw-457c,2026-03-27T18:06:28Z,"n8n: Authenticated XSS and Open Redirect via Form Node",n8n,2.11.0,2.12.0,,MODERATE,CWE-601;CWE-79,
|
|
6947
7280
|
GHSA-w6f4-3v35-qjhj,2026-03-21T03:31:13Z,"Duplicate Advisory: OpenClaw's system.run shell-wrapper positional argv carriers could execute hidden commands under misleading approval text",openclaw,0,,2026.2.23,MODERATE,CWE-436;CWE-77,
|
|
6948
|
-
GHSA-
|
|
7281
|
+
GHSA-w6v6-49gh-mc9w,2026-04-16T21:22:49Z,"Flowise: Path Traversal in Vector Store basePath",flowise,0,3.1.0,,MODERATE,CWE-22,
|
|
7282
|
+
GHSA-w6v6-49gh-mc9w,2026-04-16T21:22:49Z,"Flowise: Path Traversal in Vector Store basePath",flowise-components,0,3.1.0,,MODERATE,CWE-22,
|
|
7283
|
+
GHSA-w6wx-jq6j-6mcj,2026-04-07T18:15:52Z,"OpenClaw: pnpm dlx approvals did not bind local script operands",openclaw,0,2026.4.2,,MODERATE,CWE-863,
|
|
6949
7284
|
GHSA-w725-67p7-xv22,2020-09-03T17:05:04Z,"Command Injection in local-devices",local-devices,0,3.0.0,,HIGH,CWE-77,
|
|
6950
7285
|
GHSA-w7j5-j98m-w679,2026-03-03T22:25:13Z,"OpenClaw has multiple E2E/test Dockerfiles that run all processes as root",openclaw,0,2026.2.21,,HIGH,CWE-250,
|
|
6951
7286
|
GHSA-w7q7-vjp8-7jv4,2019-06-06T15:30:16Z,"SQL Injection in typeorm",typeorm,0,0.1.15,,CRITICAL,CWE-89,
|
|
6952
7287
|
GHSA-w7wg-24g3-2c78,2020-09-02T21:14:17Z,"Malicious Package in requset",requset,0,,,CRITICAL,CWE-506,
|
|
6953
7288
|
GHSA-w85g-3h6x-4xh2,2026-04-03T03:01:18Z,"OpenClaw: Image pixel-limit guard can fail open on sips and allow decompression-bomb DoS",openclaw,0,2026.3.31,,MODERATE,CWE-770,
|
|
6954
7289
|
GHSA-w8fh-pvq2-x8c4,2021-01-29T18:11:20Z,"Malicious npm package: sonatype",sonatype,0.0.0,,,CRITICAL,CWE-506,
|
|
7290
|
+
GHSA-w8g9-x8gx-crmm,2026-04-09T17:36:59Z,"OpenClaw: Strict browser SSRF bypass in Playwright redirect handling leaves private targets reachable",openclaw,0,2026.4.8,,MODERATE,CWE-918,
|
|
7291
|
+
GHSA-w8hx-hqjv-vjcq,2026-04-16T22:46:52Z,"Paperclip: Malicious skills able to exfiltrate and destroy all user data",@paperclipai/server,0,2026.416.0,,HIGH,CWE-77,
|
|
7292
|
+
GHSA-w8rf-7qf8-65ww,2026-03-31T12:31:35Z,"Duplicate Advisory: OpenClaw: Node-host approvals could show misleading shell payloads instead of the executed argv",openclaw,0,2026.3.11,,HIGH,CWE-451,
|
|
6955
7293
|
GHSA-w992-2gmj-9xxj,2020-09-11T21:23:29Z,"Cross-Site Scripting in swagger-ui",swagger-ui,0,2.2.1,,MODERATE,CWE-79,
|
|
6956
7294
|
GHSA-w9cg-v44m-4qv8,2026-03-03T22:09:52Z,"OpenClaw affected by BASH_ENV / ENV startup-file injection into spawned shell commands",openclaw,0,2026.2.21,,HIGH,CWE-15;CWE-78,
|
|
6957
7295
|
GHSA-w9hw-v97w-g5f5,2020-09-04T16:43:14Z,"Malicious Package in bitconi-ops",bitconi-ops,0.0.0,,,CRITICAL,CWE-506,
|
|
7296
|
+
GHSA-w9j9-w4cp-6wgr,2026-04-09T17:37:04Z,"OpenClaw Host-Exec Environment Variable Injection",openclaw,0,2026.4.8,,MODERATE,CWE-78,
|
|
6958
7297
|
GHSA-w9q5-mvc6-5cw3,2020-09-03T21:45:13Z,"Malicious Package in bufder-xor",bufder-xor,0.0.0,,,CRITICAL,CWE-506,
|
|
6959
7298
|
GHSA-wc7q-qpm4-8pqv,2020-09-02T20:32:10Z,"Malicious Package in rrequest",rrequest,0,,,CRITICAL,CWE-506,
|
|
6960
7299
|
GHSA-wch2-46wj-6x5j,2020-09-04T15:37:15Z,"Malicious Package in bip30",bip30,0.0.0,,,CRITICAL,CWE-506,
|
|
@@ -6968,11 +7307,11 @@ GHSA-wgvj-6v57-wjh3,2020-09-02T21:30:14Z,"Malicious Package in bowee",bowee,0,,,
|
|
|
6968
7307
|
GHSA-wgw3-gf4p-62xc,2020-09-11T21:16:59Z,"Command Injection in wizard-syncronizer",wizard-syncronizer,0.0.0,,,MODERATE,CWE-79,
|
|
6969
7308
|
GHSA-wgx8-r9vw-2w4h,2026-03-12T12:30:29Z," Duplicate Advisory: OpenClaw: Skill env override host env injection via applySkillConfigEnvOverrides (defense-in-depth)",openclaw,0,2026.2.21,,MODERATE,CWE-74,
|
|
6970
7309
|
GHSA-wh87-3959-vfrq,2020-09-03T21:51:58Z,"Malicious Package in buffer-hor",buffer-hor,0.0.0,,,CRITICAL,CWE-506,
|
|
7310
|
+
GHSA-whf9-3hcx-gq54,2026-04-09T17:33:05Z,"OpenClaw `device.token.rotate` mints tokens for unapproved roles, bypassing device role-upgrade pairing",openclaw,0,2026.4.8,,MODERATE,CWE-863,
|
|
6971
7311
|
GHSA-whjr-jj69-7prm,2020-09-03T19:44:35Z,"Malicious Package in import-mysql",import-mysql,0.0.0,,,CRITICAL,CWE-506,
|
|
6972
7312
|
GHSA-whpx-q3rq-w8jc,2022-10-20T18:38:35Z,"Hardening of TypedArrays with non-canonical numeric property names in SES",ses,0,0.16.0,,LOW,,
|
|
6973
7313
|
GHSA-whrh-9j4q-g7ph,2020-08-05T21:43:19Z,"CSRF Vulnerability in polaris-website",polaris-website,0,1.1.1,,MODERATE,CWE-352,
|
|
6974
7314
|
GHSA-whv6-rj84-2vh2,2020-09-04T17:21:58Z,"Cross-Site Scripting in nextcloud-vue-collections","nextcloud-vue-collections",0,0.4.2,,HIGH,CWE-79,
|
|
6975
|
-
GHSA-wj55-88gf-x564,2026-03-26T21:14:24Z,"OpenClaw may have stale policy enforcement for queued node actions",openclaw,0,2026.3.22,,MODERATE,CWE-367;CWE-863,
|
|
6976
7315
|
GHSA-wjf2-7f9g-86f5,2020-09-03T18:23:38Z,"Malicious Package in fast-requests",fast-requests,0.0.0,,,CRITICAL,CWE-506,
|
|
6977
7316
|
GHSA-wjmf-58vc-xqjr,2021-02-25T02:01:56Z,"Content injection in marked",marked,0,0.3.9,,MODERATE,,
|
|
6978
7317
|
GHSA-wjpj-gmc3-5w56,2020-09-03T22:30:31Z,"Malicious Package in buvfer-xor",buvfer-xor,0.0.0,,,CRITICAL,CWE-506,
|
|
@@ -6980,25 +7319,28 @@ GHSA-wm63-7627-ch33,2023-11-17T21:50:31Z,"@vendure/core's insecure currencyCode
|
|
|
6980
7319
|
GHSA-wm77-q74p-5763,2018-07-27T17:06:03Z,"Path Traversal in superstatic",superstatic,0,5.0.2,,HIGH,CWE-177,
|
|
6981
7320
|
GHSA-wm7q-rxch-43mx,2020-09-01T19:38:33Z,"Byass due to validation before canonicalization in serve",serve,0,6.5.2,,HIGH,,
|
|
6982
7321
|
GHSA-wmcq-3wfx-qjx5,2020-09-01T17:33:30Z,"Directory Traversal in nodeload-nmickuli",nodeload-nmickuli,0.0.0,,,HIGH,CWE-22,
|
|
7322
|
+
GHSA-wmgj-hrx3-23gj,2026-03-29T15:30:19Z,"Duplicate Advisory: OpenClaw: Unbound interpreter and runtime commands could bypass node-host approval integrity",openclaw,0,2026.3.11,,HIGH,CWE-367,
|
|
6983
7323
|
GHSA-wmjr-v86c-m9jj,2025-11-26T22:11:50Z,"Better Auth's multi-session sign-out hook allows forged cookies to revoke arbitrary sessions",better-auth,1.3.34,1.4.0,,LOW,CWE-287;CWE-345,
|
|
6984
7324
|
GHSA-wmpv-c2jp-j2xg,2021-11-15T23:28:18Z,"ERC1155Supply vulnerability in OpenZeppelin Contracts","@openzeppelin/contracts-upgradeable",4.2.0,4.3.3,,LOW,,
|
|
6985
7325
|
GHSA-wmpv-c2jp-j2xg,2021-11-15T23:28:18Z,"ERC1155Supply vulnerability in OpenZeppelin Contracts",@openzeppelin/contracts,4.2.0,4.3.3,,LOW,,
|
|
6986
7326
|
GHSA-wp2p-q35g-3rjj,2020-09-01T21:13:01Z,"Malicious Package in soket.io",soket.io,0,,,CRITICAL,CWE-506,
|
|
7327
|
+
GHSA-wpc6-37g7-8q4w,2026-04-07T18:14:35Z,"OpenClaw: Shell init-file options could satisfy exec allowlist script matching",openclaw,0,2026.3.31,,MODERATE,CWE-184,
|
|
6987
7328
|
GHSA-wpfc-3w63-g4hm,2020-09-01T21:09:48Z,"Malicious Package in axois",axois,0,,,CRITICAL,CWE-506,
|
|
6988
|
-
GHSA-wq58-2pvg-5h4f,2026-03-26T19:00:45Z,"OpenClaw: Gateway agent /reset exposes admin session reset to operator.write callers",openclaw,0,2026.3.23,,HIGH,CWE-862,
|
|
6989
7329
|
GHSA-wq95-wr7m-26h4,2025-10-06T03:31:38Z,"Duplicate Advisory: Flowise Stored XSS vulnerability through logs in chatbot",flowise,0,3.0.5,,HIGH,CWE-79,
|
|
6990
7330
|
GHSA-wqgq-mfvj-6qxp,2020-09-03T19:49:03Z,"Malicious Package in koa-body-parse",koa-body-parse,0.0.0,,,CRITICAL,CWE-506,
|
|
6991
7331
|
GHSA-wqgx-4q47-j2w5,2020-09-04T17:36:04Z,"Insecure Cryptography Algorithm in parsel",parsel,0.0.0,,,CRITICAL,CWE-327,
|
|
6992
7332
|
GHSA-wqhw-frpx-5mmp,2020-09-02T16:01:33Z,"Command Injection in tomato",tomato,0,,,HIGH,CWE-77,
|
|
7333
|
+
GHSA-wqq3-wfmp-v85g,2026-04-16T21:10:17Z,"Mojic: Observable Timing Discrepancy in HMAC Verification",mojic,0,2.1.4,,MODERATE,CWE-208,
|
|
6993
7334
|
GHSA-wr4h-v87w-p3r7,2026-03-18T16:18:32Z,"h3 has a Path Traversal via Percent-Encoded Dot Segments in serveStatic Allows Arbitrary File Read",h3,0,1.15.6,,MODERATE,CWE-116;CWE-22,
|
|
6994
7335
|
GHSA-wr4h-v87w-p3r7,2026-03-18T16:18:32Z,"h3 has a Path Traversal via Percent-Encoded Dot Segments in serveStatic Allows Arbitrary File Read",h3,2.0.0,2.0.1-rc.15,,MODERATE,CWE-116;CWE-22,
|
|
6995
7336
|
GHSA-wr92-6w3g-2hwc,2026-03-21T03:31:13Z,"Duplicate Advisory: OpenClaw's sandboxed sessions_spawn now enforces sandbox inheritance for cross-agent spawns",openclaw,0,,,HIGH,CWE-732,
|
|
6996
7337
|
GHSA-wrw9-m778-g6mc,2019-06-03T17:27:57Z,"Memory Exposure in bl",bl,0,0.9.5,,MODERATE,CWE-200,
|
|
6997
7338
|
GHSA-wrw9-m778-g6mc,2019-06-03T17:27:57Z,"Memory Exposure in bl",bl,1.0.0,1.0.1,,MODERATE,CWE-200,
|
|
6998
7339
|
GHSA-wv39-cgmm-cq29,2020-09-03T22:23:00Z,"Malicious Package in buffmr-xor",buffmr-xor,0.0.0,,,CRITICAL,CWE-506,
|
|
6999
|
-
GHSA-wv46-v6xc-2qhf,2026-03-26T19:08:16Z,"OpenClaw: Synology Chat reply delivery could be rebound through username-based user resolution.",openclaw,0,2026.3.22,,HIGH,CWE-639;CWE-706,
|
|
7000
7340
|
GHSA-wvh7-5p38-2qfc,2020-07-23T18:20:10Z,"Storing Password in Local Storage",parse,0,2.10.0,,MODERATE,CWE-256,
|
|
7001
7341
|
GHSA-wvr4-3wq4-gpc5,2026-03-19T12:51:28Z,"MCP Connect has unauthenticated remote OS command execution via /bridge endpoint",mcp-bridge,0,,2.0.0,CRITICAL,CWE-306,
|
|
7342
|
+
GHSA-wwfp-w96m-c6x8,2026-04-07T18:14:44Z,"OpenClaw: Pairing pending-request caps were enforced per channel instead of per account",openclaw,2026.2.26,2026.3.31,,MODERATE,,
|
|
7343
|
+
GHSA-wwrj-437c-ppq4,2026-03-31T12:31:35Z,"Duplicate Advisory: OpenClaw's system.run approvals did not bind mutable script operands across approval and execution",openclaw,0,2026.3.8,,MODERATE,CWE-367,
|
|
7002
7344
|
GHSA-wwwg-6r7f-9c9h,2020-09-03T19:43:28Z,"Malicious Package in file-logging",file-logging,0.0.0,,,CRITICAL,CWE-506,
|
|
7003
7345
|
GHSA-wx77-rp39-c6vg,2020-09-04T15:11:03Z,"Regular Expression Denial of Service in markdown",markdown,0.0.0,,,LOW,CWE-400,
|
|
7004
7346
|
GHSA-wx84-69jh-jjp2,2020-08-03T18:22:36Z,Withdrawn,sshpk,0,1.13.2,,HIGH,,
|
|
@@ -7009,7 +7351,7 @@ GHSA-wxhq-pm8v-cw75,2019-06-05T20:50:16Z,"Regular Expression Denial of Service i
|
|
|
7009
7351
|
GHSA-wxj2-777f-vxmf,2024-01-03T18:30:51Z,"Duplicate Advisory: Cross-site scripting vulnerability in TinyMCE plugins",tinymce,0,,,MODERATE,CWE-79,
|
|
7010
7352
|
GHSA-wxrm-2h86-v95f,2020-09-03T21:04:20Z,"Malicious Package in pizza-pasta",pizza-pasta,0.0.0,,,CRITICAL,CWE-506,
|
|
7011
7353
|
GHSA-wxvm-fh75-mpgr,2018-07-26T16:24:34Z,"Critical severity vulnerability that affects dns-sync",dns-sync,0,0.1.1,,CRITICAL,,
|
|
7012
|
-
GHSA-
|
|
7354
|
+
GHSA-wxw2-rwmh-vr8f,2026-04-16T21:24:22Z,"electerm: electerm_install_script_CommandInjection Vulnerability Report",electerm,0,3.3.8,,CRITICAL,,
|
|
7013
7355
|
GHSA-x2g5-fvc2-gqvp,2026-03-05T21:54:31Z,"Flowise has Insufficient Password Salt Rounds",flowise,0,3.0.13,,MODERATE,CWE-328;CWE-916,
|
|
7014
7356
|
GHSA-x2m8-53h4-6hch,2026-04-03T03:27:38Z,"OpenClaw: Discord voice ingress authorization can be bypassed via channel, name, and stale-role validation gaps",openclaw,0,2026.3.31,,LOW,CWE-862,
|
|
7015
7357
|
GHSA-x39m-3393-3qp4,2025-11-14T20:56:02Z,"Flowise doesn't Prevent Bypass of Password Confirmation through Unverified Email Change (credentials)",flowise-ui,0,3.0.10,,HIGH,CWE-306;CWE-620,
|
|
@@ -7023,11 +7365,13 @@ GHSA-x4rf-4mqf-cm8w,2020-08-19T22:44:22Z,"Open Redirect in ecstatic",ecstatic,0,
|
|
|
7023
7365
|
GHSA-x4rf-4mqf-cm8w,2020-08-19T22:44:22Z,"Open Redirect in ecstatic",ecstatic,3.0.0,3.3.2,,MODERATE,,
|
|
7024
7366
|
GHSA-x4rf-4mqf-cm8w,2020-08-19T22:44:22Z,"Open Redirect in ecstatic",ecstatic,4.0.0,4.1.2,,MODERATE,,
|
|
7025
7367
|
GHSA-x565-32qp-m3vf,2024-04-11T21:30:30Z,"phin may include sensitive headers in subsequent requests after redirect",phin,0,3.7.1,,MODERATE,CWE-200,
|
|
7368
|
+
GHSA-x5w6-38gp-mrqh,2026-04-16T21:53:16Z,"Flowise: Password Reset Link Sent Over Unsecured HTTP",flowise,0,3.1.0,,HIGH,CWE-319,
|
|
7026
7369
|
GHSA-x6ch-c6rv-f7wh,2020-09-02T18:34:22Z,"Malicious Package in asymc",asymc,0,,,CRITICAL,CWE-506,
|
|
7027
7370
|
GHSA-x6gq-467r-hwcc,2020-09-01T21:14:05Z,"Malicious Package in soket.js",soket.js,0,,,CRITICAL,CWE-506,
|
|
7028
7371
|
GHSA-x6m6-5hrf-fh6r,2020-09-01T21:26:50Z,"Denial of Service in markdown-it-toc-and-anchor","markdown-it-toc-and-anchor",0,4.2.0,,HIGH,CWE-400,
|
|
7029
7372
|
GHSA-x732-6j76-qmhm,2025-12-16T21:22:45Z,"Better Auth's rou3 Dependency has Double-Slash Path Normalization which can Bypass disabledPaths Config and Rate Limits",better-auth,0,1.4.5,,HIGH,CWE-400;CWE-41,
|
|
7030
7373
|
GHSA-x742-88jj-7hv9,2026-03-19T03:30:57Z,"Duplicate Advisory: allowlist exec-guard bypass via env -S",openclaw,0,,,HIGH,CWE-184,
|
|
7374
|
+
GHSA-x7mm-9vvv-64w8,2026-04-10T22:09:39Z,"unhead: Streaming SSR `streamKey` injected into inline script without identifier validation",unhead,3.0.0-beta.5,3.0.1,,LOW,CWE-79,
|
|
7031
7375
|
GHSA-x7rp-qj2h-ghgw,2025-11-14T20:50:36Z,"Flowise Fails to Invalidate Existing Sessions After Password Changes",flowise,0,3.0.10,,HIGH,CWE-613,
|
|
7032
7376
|
GHSA-x82f-27x3-q89c,2026-03-02T21:55:25Z,"OpenClaw's TOCTOU symlink race in writeFileWithinRoot could create or truncate files outside root boundaries",openclaw,0,2026.3.1,,HIGH,CWE-367;CWE-59,
|
|
7033
7377
|
GHSA-x87g-rgrh-r6g3,2020-09-03T17:07:15Z,"Malicious Package in rpc-websocket",rpc-websocket,0.7.7,,,CRITICAL,CWE-506,
|
|
@@ -7039,19 +7383,22 @@ GHSA-xcgx-27q5-7634,2020-09-03T19:41:05Z,"Malicious Package in commanedr",comman
|
|
|
7039
7383
|
GHSA-xcxh-6cv4-q8p8,2025-08-12T00:13:03Z,"HFS user adding a ""web link"" in HFS is vulnerable to ""target=_blank"" exploit",hfs,0,0.57.10,,LOW,CWE-1022,
|
|
7040
7384
|
GHSA-xf5p-87ch-gxw2,2019-06-05T14:10:03Z,"Marked ReDoS due to email addresses being evaluated in quadratic time",marked,0.3.14,0.6.2,,MODERATE,CWE-400,
|
|
7041
7385
|
GHSA-xf64-2f9p-6pqq,2020-09-04T17:24:08Z,"Information Exposure in type-graphql",type-graphql,0,0.17.6,,LOW,CWE-209,
|
|
7042
|
-
GHSA-xf99-j42q-5w5p,2026-03-13T15:47:41Z,"OpenClaw: Unbound interpreter and runtime commands could bypass node-host approval integrity",openclaw,0,2026.3.11,,HIGH,CWE-367,
|
|
7043
7386
|
GHSA-xffm-g5w8-qvg7,2025-07-18T20:39:12Z,"@eslint/plugin-kit is vulnerable to Regular Expression Denial of Service attacks through ConfigCommentParser",@eslint/plugin-kit,0,0.3.4,,LOW,CWE-1333,
|
|
7387
|
+
GHSA-xfqj-r5qw-8g4j,2026-04-16T22:47:05Z,"Paperclip: Unauthenticated Access to Multiple API Endpoints in Authenticated Mode",@paperclipai/server,0,2026.416.0,,HIGH,CWE-306,
|
|
7044
7388
|
GHSA-xfrc-7mj2-5xh9,2020-09-03T17:14:51Z,"Undefined Behavior in zencashjs",zencashjs,0,1.2.0,,CRITICAL,,
|
|
7389
|
+
GHSA-xg59-f45v-9r9j,2026-03-31T12:31:36Z,"Duplicate Advisory: OpenClaw's MS Teams sender allowlist bypass when route allowlist is configured and sender allowlist is empty",openclaw,0,2026.3.8,,LOW,CWE-863,
|
|
7045
7390
|
GHSA-xg6x-h9c9-2m83,2026-04-03T03:29:59Z,"Better Auth Has Two-Factor Authentication Bypass via Premature Session Caching (session.cookieCache)",better-auth,0,1.4.9,,CRITICAL,CWE-288,
|
|
7046
7391
|
GHSA-xgh6-85xh-479p,2020-10-16T18:56:26Z,"Regular Expression Denial of Service in npm-user-validate",npm-user-validate,0,1.0.1,,LOW,,
|
|
7047
7392
|
GHSA-xgp2-cc4r-7vf6,2020-09-03T20:44:21Z,"Denial of Service in http-live-simulator",http-live-simulator,0,1.0.8,,MODERATE,,
|
|
7048
7393
|
GHSA-xgwg-m42c-8q62,2026-03-21T03:31:14Z,"Duplicate Advisory: OpenClaw: Slack system events bypass sender authorization in member and message subtype handlers",openclaw,0,,2026.2.25,MODERATE,CWE-863,
|
|
7049
7394
|
GHSA-xgx4-2wgv-4jhm,2026-03-20T20:45:08Z,"PDFME has XSS via Unsanitized i18n Label Injection into innerHTML in multiVariableText propPanel",@pdfme/schemas,0,5.5.10,,MODERATE,CWE-79,
|
|
7050
7395
|
GHSA-xh2p-7p87-fhgh,2021-08-05T16:56:58Z,"Incorrect TCR calculation in batchLiquidateTroves() during Recovery Mode",@liquity/contracts,0,,1.0.0,LOW,CWE-682,
|
|
7396
|
+
GHSA-xh72-v6v9-mwhc,2026-04-17T22:32:47Z,"OpenClaw: Feishu webhook and card-action validation now fail closed",openclaw,0,2026.4.15,,CRITICAL,CWE-1188;CWE-287;CWE-294,
|
|
7051
7397
|
GHSA-xh8g-j88w-6v59,2020-09-03T19:42:16Z,"Malicious Package in cionstring",cionstring,0.0.0,,,CRITICAL,CWE-506,
|
|
7052
7398
|
GHSA-xh9j-mpc9-2m9p,2026-03-21T03:31:14Z,"Duplicate Advisory: OpenClaw has a Trusted-proxy Control UI pairing bypass which allows unpaired node sessions",openclaw,0,,2026.2.24,MODERATE,CWE-807,
|
|
7053
7399
|
GHSA-xhjx-mfr6-9rr4,2020-09-01T21:20:28Z,"Command Injection in samsung-remote",samsung-remote,0,1.3.5,,CRITICAL,CWE-77,
|
|
7054
|
-
GHSA-
|
|
7400
|
+
GHSA-xhmj-rg95-44hv,2026-04-16T21:50:12Z,"Flowise: SSRF Protection Bypass via Unprotected Built-in HTTP Modules in Custom Function Sandbox",flowise,0,3.1.0,,HIGH,CWE-284;CWE-918,
|
|
7401
|
+
GHSA-xhmj-rg95-44hv,2026-04-16T21:50:12Z,"Flowise: SSRF Protection Bypass via Unprotected Built-in HTTP Modules in Custom Function Sandbox",flowise-components,0,3.1.0,,HIGH,CWE-284;CWE-918,
|
|
7055
7402
|
GHSA-xj9w-5r6q-x6v4,2026-04-03T02:59:03Z,"OpenClaw: Device-Paired Node Skips Node Scope Gate → Host RCE.md",openclaw,0,2026.3.31,,HIGH,CWE-863,
|
|
7056
7403
|
GHSA-xjj9-2w6f-jg55,2026-03-12T12:30:29Z," Duplicate Advisory: OpenClaw safeBins file-existence oracle information disclosure",openclaw,0,2026.2.19,,MODERATE,CWE-200,
|
|
7057
7404
|
GHSA-xjr7-3c3g-m763,2026-01-13T20:29:00Z,"Renovate vulnerable to arbitrary command injection via gleam manager and malicious gleam.toml file",renovate,39.53.0,40.33.0,,MODERATE,CWE-77,
|
|
@@ -7060,13 +7407,15 @@ GHSA-xm7f-x4wx-wmgv,2019-06-04T15:47:43Z,"Out-of-bounds Read in byte",byte,0,1.4
|
|
|
7060
7407
|
GHSA-xmh9-rg6f-j3mr,2021-03-12T22:39:01Z,"Verification flaw in Solid identity-token-verifier","@solid/identity-token-verifier",0,0.5.2,,MODERATE,CWE-290,
|
|
7061
7408
|
GHSA-xmmp-hrmx-x5g7,2020-09-02T21:32:22Z,"Malicious Package in bowe",bowe,0,,,CRITICAL,CWE-506,
|
|
7062
7409
|
GHSA-xmv6-r34m-62p4,2026-03-03T22:08:54Z,"OpenClaw: Sandbox media fallback tmp symlink alias bypass allows host file reads outside sandboxRoot",openclaw,0,2026.2.25,,HIGH,CWE-22;CWE-59,
|
|
7063
|
-
GHSA-
|
|
7410
|
+
GHSA-xmxx-7p24-h892,2026-04-17T22:32:02Z,"OpenClaw: Gateway HTTP endpoints re-resolve bearer auth after SecretRef rotation",openclaw,0,2026.4.15,,HIGH,CWE-324,
|
|
7064
7411
|
GHSA-xphh-5v4r-r3rx,2025-12-30T19:25:04Z,"PsiTransfer has Zip Slip Path Traversal via TAR Archive Download",psitransfer,0,2.3.1,,HIGH,CWE-22;CWE-23,
|
|
7065
7412
|
GHSA-xq3g-m3j8-2vmm,2026-03-21T03:31:13Z,"Duplicate Advisory: OpenClaw's inbound media downloads could exceed configured byte limits before rejection across multiple channels",openclaw,0,,,HIGH,CWE-770,
|
|
7066
7413
|
GHSA-xq7h-vwjp-5vrh,2026-03-25T17:30:46Z,"@grackle-ai/powerline Runs Without Authentication by Default",@grackle-ai/powerline,0,0.70.1,,MODERATE,CWE-306,
|
|
7067
|
-
GHSA-
|
|
7414
|
+
GHSA-xq94-r468-qwgj,2026-04-17T21:58:01Z,"OpenClaw: Browser SSRF hostname validation could be bypassed by DNS rebinding",openclaw,0,2026.4.10,,MODERATE,CWE-350;CWE-918,
|
|
7068
7415
|
GHSA-xr3g-4gg5-w3wq,2020-09-03T17:06:14Z,"Malicious Package in degbu",degbu,0.0.0,,,CRITICAL,CWE-506,
|
|
7069
7416
|
GHSA-xr53-m937-jr9c,2020-09-03T15:49:14Z,"Cross-Site Scripting in ngx-md",ngx-md,0,6.0.3,,HIGH,CWE-79,
|
|
7417
|
+
GHSA-xr8f-h2gw-9xh6,2026-04-16T22:44:27Z,"OAuth 2.1 Provider: Unprivileged users can register OAuth clients","@better-auth/oauth-provider",1.4.8-beta.7,1.6.5,,HIGH,CWE-863,
|
|
7418
|
+
GHSA-xr8f-h2gw-9xh6,2026-04-16T22:44:27Z,"OAuth 2.1 Provider: Unprivileged users can register OAuth clients","@better-auth/oauth-provider",1.7.0-beta.0,,1.7.0-beta.1,HIGH,CWE-863,
|
|
7070
7419
|
GHSA-xrgv-34cc-q765,2026-03-19T03:30:57Z,"Duplicate Advisory: OpenClaw's system.run allowlist bypass via shell line-continuation command substitution",openclaw,0,,,MODERATE,CWE-78,
|
|
7071
7420
|
GHSA-xrmp-99wj-p6jc,2019-05-31T23:43:09Z,"Prototype Pollution in deap",deap,0,1.0.1,,HIGH,CWE-400,
|
|
7072
7421
|
GHSA-xrr6-6ww3-f3qm,2020-09-02T21:25:58Z,"Sandbox Breakout / Arbitrary Code Execution in value-censorship",value-censorship,0,,,MODERATE,,
|
|
@@ -7074,9 +7423,8 @@ GHSA-xrrg-wfwc-c7r3,2020-09-04T15:33:52Z,"Malicious Package in bictoin-ops",bict
|
|
|
7074
7423
|
GHSA-xv3q-jrmm-4fxv,2023-04-18T22:28:02Z,"Authentication Bypass in @strapi/plugin-users-permissions","@strapi/plugin-users-permissions",3.2.1,4.6.0,,HIGH,,
|
|
7075
7424
|
GHSA-xv56-3wq5-9997,2026-01-13T19:57:06Z,"Renovate vulnerable to arbitrary command injection via kustomize manager and malicious helm repository",renovate,39.218.0,40.33.0,,MODERATE,CWE-77,
|
|
7076
7425
|
GHSA-xvp7-8vm8-xfxx,2025-10-20T17:55:59Z,"Actual Sync-server Gocardless service is logging sensitive data including bearer tokens and account numbers",@actual-app/sync-server,0,,25.10.0,MODERATE,CWE-209;CWE-219,
|
|
7077
|
-
GHSA-xvx8-77m6-gwg6,2026-03-13T15:47:15Z,"OpenClaw: Sandbox `writeFile` commit could race outside the validated path",openclaw,0,2026.3.11,,MODERATE,CWE-367,
|
|
7078
|
-
GHSA-xw77-45gv-p728,2026-03-13T15:47:23Z,"OpenClaw: Plugin subagent routes could bypass gateway authorization with synthetic admin scopes",openclaw,2026.3.7,2026.3.11,,CRITICAL,CWE-269;CWE-285,
|
|
7079
7426
|
GHSA-xw79-hhv6-578c,2020-09-11T21:16:59Z,"Cross-Site Scripting in serve",serve,0,10.0.2,,HIGH,CWE-79,
|
|
7080
7427
|
GHSA-xwcj-hwhf-h378,2026-03-16T20:40:13Z,"OpenClaw Telegram media fetch errors exposed bot tokens in logged file URLs",openclaw,0,2026.3.13,,MODERATE,CWE-532,
|
|
7081
7428
|
GHSA-xwqw-rf2q-xmhf,2020-09-01T21:23:38Z,"Cross-Site Scripting in buefy",buefy,0,0.7.2,,HIGH,CWE-79,
|
|
7082
7429
|
GHSA-xx4c-jj58-r7x6,2021-11-19T20:14:23Z,"Inefficient Regular Expression Complexity in Validator.js",validator,11.1.0,13.7.0,,MODERATE,CWE-1333,
|
|
7430
|
+
GHSA-xxj4-96ph-g6j6,2026-03-31T12:31:36Z,"Duplicate Advisory: OpenClaw: Sandbox `writeFile` commit could race outside the validated path",openclaw,0,2026.3.11,,MODERATE,CWE-367,
|