Skip to content

Commit 35d9b9e

Browse files
1 parent 85e92d7 commit 35d9b9e

3 files changed

Lines changed: 66 additions & 13 deletions

File tree

advisories/github-reviewed/2026/03/GHSA-9q36-67vc-rrwg/GHSA-9q36-67vc-rrwg.json

Lines changed: 17 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9q36-67vc-rrwg",
4-
"modified": "2026-03-23T21:49:25Z",
4+
"modified": "2026-03-30T13:31:02Z",
55
"published": "2026-03-09T19:54:54Z",
66
"aliases": [
77
"CVE-2026-27646"
@@ -11,7 +11,11 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N"
14+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -43,6 +47,10 @@
4347
"type": "WEB",
4448
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-9q36-67vc-rrwg"
4549
},
50+
{
51+
"type": "ADVISORY",
52+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27646"
53+
},
4654
{
4755
"type": "WEB",
4856
"url": "https://github.com/openclaw/openclaw/commit/61000b8e4ded919ca1a825d4700db4cb3fdc56e3"
@@ -54,16 +62,21 @@
5462
{
5563
"type": "WEB",
5664
"url": "https://github.com/openclaw/openclaw/releases/tag/v2026.3.7"
65+
},
66+
{
67+
"type": "WEB",
68+
"url": "https://vulncheck.com/advisories/openclaw-mar-sandbox-escape-via-acp-spawn-command"
5769
}
5870
],
5971
"database_specific": {
6072
"cwe_ids": [
6173
"CWE-284",
62-
"CWE-693"
74+
"CWE-693",
75+
"CWE-863"
6376
],
6477
"severity": "MODERATE",
6578
"github_reviewed": true,
6679
"github_reviewed_at": "2026-03-09T19:54:54Z",
67-
"nvd_published_at": null
80+
"nvd_published_at": "2026-03-23T22:16:25Z"
6881
}
6982
}

advisories/unreviewed/2026/03/GHSA-hggm-x7r9-mm7v/GHSA-hggm-x7r9-mm7v.json renamed to advisories/github-reviewed/2026/03/GHSA-hggm-x7r9-mm7v/GHSA-hggm-x7r9-mm7v.json

Lines changed: 33 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,43 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hggm-x7r9-mm7v",
4-
"modified": "2026-03-26T18:31:41Z",
4+
"modified": "2026-03-30T13:29:48Z",
55
"published": "2026-03-26T18:31:41Z",
66
"aliases": [
77
"CVE-2026-32846"
88
],
9+
"summary": "OpenClaw is vulnerable to Path Traversal through path validation bypass",
910
"details": "OpenClaw through 2026.3.23 (fixed in commit 4797bbc) contains a path traversal vulnerability in media parsing that allows attackers to read arbitrary files by bypassing path validation in the isLikelyLocalPath() and isValidMedia() functions. Attackers can exploit incomplete validation and the allowBareFilename bypass to reference files outside the intended application sandbox, resulting in disclosure of sensitive information including system files, environment files, and SSH keys.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V4",
13-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "openclaw"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "2026.03.28"
32+
}
33+
]
34+
}
35+
],
36+
"database_specific": {
37+
"last_known_affected_version_range": "<= 2026.3.23"
38+
}
1439
}
1540
],
16-
"affected": [],
1741
"references": [
1842
{
1943
"type": "WEB",
@@ -31,6 +55,10 @@
3155
"type": "WEB",
3256
"url": "https://github.com/openclaw/openclaw/commit/4797bbc5b96e2cca5532e43b58915c051746fe37"
3357
},
58+
{
59+
"type": "PACKAGE",
60+
"url": "https://github.com/openclaw/openclaw"
61+
},
3462
{
3563
"type": "WEB",
3664
"url": "https://www.vulncheck.com/advisories/openclaw-media-parsing-path-traversal-to-arbitrary-file-read"
@@ -41,8 +69,8 @@
4169
"CWE-22"
4270
],
4371
"severity": "HIGH",
44-
"github_reviewed": false,
45-
"github_reviewed_at": null,
72+
"github_reviewed": true,
73+
"github_reviewed_at": "2026-03-30T13:29:48Z",
4674
"nvd_published_at": "2026-03-26T17:16:37Z"
4775
}
4876
}

advisories/github-reviewed/2026/03/GHSA-r6qf-8968-wj9q/GHSA-r6qf-8968-wj9q.json

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-r6qf-8968-wj9q",
4-
"modified": "2026-03-23T21:49:07Z",
4+
"modified": "2026-03-30T13:30:28Z",
55
"published": "2026-03-09T19:54:25Z",
66
"aliases": [
77
"CVE-2026-27183"
@@ -11,7 +11,11 @@
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
14-
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"
14+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -43,6 +47,10 @@
4347
"type": "WEB",
4448
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-r6qf-8968-wj9q"
4549
},
50+
{
51+
"type": "ADVISORY",
52+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27183"
53+
},
4654
{
4755
"type": "WEB",
4856
"url": "https://github.com/openclaw/openclaw/commit/2fc95a7cfc1eb9306356510b0251b6d51fb1c0b0"
@@ -54,16 +62,20 @@
5462
{
5563
"type": "WEB",
5664
"url": "https://github.com/openclaw/openclaw/releases/tag/v2026.3.7"
65+
},
66+
{
67+
"type": "WEB",
68+
"url": "https://vulncheck.com/advisories/openclaw-mar-shell-approval-gating-bypass-via-dispatch-wrapper-depth-mismatch"
5769
}
5870
],
5971
"database_specific": {
6072
"cwe_ids": [
6173
"CWE-436",
6274
"CWE-863"
6375
],
64-
"severity": "MODERATE",
76+
"severity": "LOW",
6577
"github_reviewed": true,
6678
"github_reviewed_at": "2026-03-09T19:54:25Z",
67-
"nvd_published_at": null
79+
"nvd_published_at": "2026-03-23T22:16:25Z"
6880
}
6981
}

0 commit comments

Comments
 (0)