Skip to content

Commit 340df12

Browse files
1 parent bfbfe16 commit 340df12

4 files changed

Lines changed: 37 additions & 12 deletions

File tree

advisories/github-reviewed/2026/03/GHSA-2fgq-7j6h-9rm4/GHSA-2fgq-7j6h-9rm4.json

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2fgq-7j6h-9rm4",
4-
"modified": "2026-03-19T22:17:15Z",
4+
"modified": "2026-03-30T13:19:17Z",
55
"published": "2026-03-03T00:40:56Z",
66
"aliases": [
77
"CVE-2026-32003"
@@ -12,6 +12,10 @@
1212
{
1313
"type": "CVSS_V3",
1414
"score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -40,23 +44,31 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-2fgq-7j6h-9rm4"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32003"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/commit/e80c803fa887f9699ad87a9e906ab5c1ff85bd9a"
4654
},
4755
{
4856
"type": "PACKAGE",
4957
"url": "https://github.com/openclaw/openclaw"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://www.vulncheck.com/advisories/openclaw-remote-code-execution-via-shellopts-ps4-environment-injection-in-system-run"
5062
}
5163
],
5264
"database_specific": {
5365
"cwe_ids": [
5466
"CWE-15",
5567
"CWE-78"
5668
],
57-
"severity": "MODERATE",
69+
"severity": "HIGH",
5870
"github_reviewed": true,
5971
"github_reviewed_at": "2026-03-03T00:40:56Z",
60-
"nvd_published_at": null
72+
"nvd_published_at": "2026-03-19T22:16:32Z"
6173
}
6274
}

advisories/github-reviewed/2026/03/GHSA-2ww6-868g-2c56/GHSA-2ww6-868g-2c56.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2ww6-868g-2c56",
4-
"modified": "2026-03-20T21:14:26Z",
4+
"modified": "2026-03-30T13:17:36Z",
55
"published": "2026-03-03T18:30:39Z",
66
"aliases": [
77
"CVE-2026-32040"
@@ -15,7 +15,7 @@
1515
},
1616
{
1717
"type": "CVSS_V4",
18-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"
18+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"
1919
}
2020
],
2121
"affected": [
@@ -69,7 +69,7 @@
6969
"cwe_ids": [
7070
"CWE-79"
7171
],
72-
"severity": "MODERATE",
72+
"severity": "LOW",
7373
"github_reviewed": true,
7474
"github_reviewed_at": "2026-03-03T18:30:39Z",
7575
"nvd_published_at": "2026-03-19T22:16:40Z"

advisories/github-reviewed/2026/03/GHSA-vpj2-69hf-rppw/GHSA-vpj2-69hf-rppw.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vpj2-69hf-rppw",
4-
"modified": "2026-03-20T21:14:11Z",
4+
"modified": "2026-03-30T13:17:04Z",
55
"published": "2026-03-02T21:49:14Z",
66
"aliases": [
77
"CVE-2026-32041"
@@ -15,7 +15,7 @@
1515
},
1616
{
1717
"type": "CVSS_V4",
18-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
18+
"score": "CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N"
1919
}
2020
],
2121
"affected": [
@@ -61,7 +61,7 @@
6161
"cwe_ids": [
6262
"CWE-306"
6363
],
64-
"severity": "MODERATE",
64+
"severity": "HIGH",
6565
"github_reviewed": true,
6666
"github_reviewed_at": "2026-03-02T21:49:14Z",
6767
"nvd_published_at": "2026-03-19T22:16:40Z"

advisories/github-reviewed/2026/03/GHSA-wpph-cjgr-7c39/GHSA-wpph-cjgr-7c39.json

Lines changed: 16 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,21 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-wpph-cjgr-7c39",
4-
"modified": "2026-03-19T22:29:51Z",
4+
"modified": "2026-03-30T13:18:04Z",
55
"published": "2026-03-03T23:12:21Z",
66
"aliases": [
77
"CVE-2026-32039"
88
],
99
"summary": "OpenClaw's typed sender-key matching for toolsBySender prevents identity-collision policy bypass",
1010
"details": "### Summary\n`channels.*.groups.*.toolsBySender` could match a privileged sender policy using a colliding mutable identity value (for example `senderName` or `senderUsername`) when deployments used untyped keys.\n\nThe fix introduces explicit typed sender keys (`id:`, `e164:`, `username:`, `name:`), keeps legacy untyped keys on a deprecated ID-only path, and adds regression coverage to prevent cross-identifier collisions.\n\n### Affected Packages / Versions\n- Package: npm `openclaw`\n- Affected versions: `<= 2026.2.21-2`\n- Latest published npm version at triage time (February 22, 2026): `2026.2.21-2`\n- Patched version (planned next release): `2026.2.22`\n\n### Impact\nThis is a sender-authorization bypass in group tool policy matching for deployments that use `toolsBySender` with untyped keys. Under those conditions, an attacker could inherit stronger tool permissions intended for another sender if they can force an identifier collision.\n\n### Fix Commit(s)\n- `5547a2275cb69413af3b62c795b93214fe913b57`\n\n### Release Process Note\n`patched_versions` is pre-set to the planned next release (`2026.2.22`). Once that npm release is published, this advisory should only need publishing.\n\nOpenClaw thanks @jiseoung for reporting.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N"
15+
},
1216
{
1317
"type": "CVSS_V4",
14-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"
18+
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -40,22 +44,31 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-wpph-cjgr-7c39"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32039"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/commit/5547a2275cb69413af3b62c795b93214fe913b57"
4654
},
4755
{
4856
"type": "PACKAGE",
4957
"url": "https://github.com/openclaw/openclaw"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://www.vulncheck.com/advisories/openclaw-sender-authorization-bypass-via-identity-collision-in-toolsbysender"
5062
}
5163
],
5264
"database_specific": {
5365
"cwe_ids": [
66+
"CWE-639",
5467
"CWE-863"
5568
],
5669
"severity": "MODERATE",
5770
"github_reviewed": true,
5871
"github_reviewed_at": "2026-03-03T23:12:21Z",
59-
"nvd_published_at": null
72+
"nvd_published_at": "2026-03-19T22:16:40Z"
6073
}
6174
}

0 commit comments

Comments
 (0)