Skip to content

Commit 66f4fea

Browse files
1 parent cf37656 commit 66f4fea

3 files changed

Lines changed: 52 additions & 10 deletions

File tree

advisories/github-reviewed/2026/03/GHSA-25gx-x37c-7pph/GHSA-25gx-x37c-7pph.json

Lines changed: 18 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,21 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-25gx-x37c-7pph",
4-
"modified": "2026-03-03T19:17:48Z",
4+
"modified": "2026-03-30T13:43:24Z",
55
"published": "2026-03-03T19:17:48Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2026-32064"
8+
],
79
"summary": "OpenClaw's andbox browser noVNC observer lacked VNC authentication",
810
"details": "The sandbox browser entrypoint launched `x11vnc` without authentication (`-nopw`) for noVNC observer sessions.\n\nOpenClaw-managed runtime flow publishes the noVNC port to host loopback only (`127.0.0.1`), so default exposure is local to the host unless operators explicitly expose the port more broadly (or run the image standalone with broad port publishing).\n\n## Affected Packages / Versions\n\n- Package: `docker/openclaw`\n- Affected: `<= 2026.2.19-2`\n- Patched: `>= 2026.2.21`\n\n## Technical details\n\n- `scripts/sandbox-browser-entrypoint.sh` used `x11vnc ... -nopw` for noVNC observer flow.\n- `websockify` exposed noVNC for the container listener.\n- OpenClaw runtime (`src/agents/sandbox/browser.ts`) already mapped host publish to loopback, but observer auth was missing.\n\n## Fix\n\n- Require VNC password auth in the sandbox browser entrypoint (`x11vnc -rfbauth`), replacing `-nopw`.\n- Generate per-container noVNC password in runtime and inject `OPENCLAW_BROWSER_NOVNC_PASSWORD`.\n- Emit short-lived noVNC observer token URLs instead of sharing raw noVNC passwords in shared URLs.\n- Keep loopback-only host port publish and bump sandbox browser security hash epoch.\n- Add security audit findings for sandbox browser containers that publish ports on non-loopback interfaces.\n\nOperational note: rebuild the sandbox browser image and recreate browser containers so existing containers pick up the fix.\n\n## Fix Commit(s)\n\n- `621d8e1312482f122f18c43c72c67211b141da01`\n- `8c1518f0f3e0533593cd2dec3a46c9b746753661`\n\n## Release Process Note\n\nPatched version is pre-set to the planned next release (`2026.2.21`). After npm release, this advisory can be published without further field edits.\n\nOpenClaw thanks @TerminalsandCoffee for reporting.",
911
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
15+
},
1016
{
1117
"type": "CVSS_V4",
12-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
18+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
1319
}
1420
],
1521
"affected": [
@@ -38,6 +44,10 @@
3844
"type": "WEB",
3945
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-25gx-x37c-7pph"
4046
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32064"
50+
},
4151
{
4252
"type": "WEB",
4353
"url": "https://github.com/openclaw/openclaw/commit/621d8e1312482f122f18c43c72c67211b141da01"
@@ -49,14 +59,18 @@
4959
{
5060
"type": "PACKAGE",
5161
"url": "https://github.com/openclaw/openclaw"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://www.vulncheck.com/advisories/openclaw-missing-vnc-authentication-in-sandbox-browser-novnc-observer"
5266
}
5367
],
5468
"database_specific": {
5569
"cwe_ids": [
5670
"CWE-287",
5771
"CWE-862"
5872
],
59-
"severity": "MODERATE",
73+
"severity": "HIGH",
6074
"github_reviewed": true,
6175
"github_reviewed_at": "2026-03-03T19:17:48Z",
6276
"nvd_published_at": null

advisories/github-reviewed/2026/03/GHSA-hwpq-rrpf-pgcq/GHSA-hwpq-rrpf-pgcq.json

Lines changed: 18 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,21 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hwpq-rrpf-pgcq",
4-
"modified": "2026-03-02T23:33:08Z",
4+
"modified": "2026-03-30T13:44:16Z",
55
"published": "2026-03-02T23:33:08Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2026-32065"
8+
],
79
"summary": "OpenClaw: system.run approval identity mismatch could execute a different binary than displayed",
810
"details": "### Summary\n`system.run` approvals in OpenClaw used rendered command text as the approval identity while trimming argv token whitespace. Runtime execution still used raw argv. A crafted trailing-space executable token could therefore execute a different binary than what the approver saw.\n\n### Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Affected versions: `<= 2026.2.24`\n- Patched versions: `>= 2026.2.25`\n\n### Impact\nThis is an approval-integrity bypass that can lead to unexpected command execution under the OpenClaw runtime user when an attacker can influence `command` argv and reuse/obtain a matching approval context.\n\n### Trust Model Note\nOpenClaw does not treat adversarial multi-user sharing of one gateway host/config as a supported security boundary. This finding is still valid in supported deployments because it breaks the operator approval boundary itself (approved display command vs executed argv).\n\n### Fix Commit(s)\n- `03e689fc89bbecbcd02876a95957ef1ad9caa176`\n\n### Release Process Note\n`patched_versions` is pre-set to the release (`2026.2.25`). Advisory published with npm release `2026.2.25`.\n\nOpenClaw thanks @tdjackey for reporting.",
911
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N"
15+
},
1016
{
1117
"type": "CVSS_V4",
12-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
18+
"score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"
1319
}
1420
],
1521
"affected": [
@@ -41,21 +47,29 @@
4147
"type": "WEB",
4248
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-hwpq-rrpf-pgcq"
4349
},
50+
{
51+
"type": "ADVISORY",
52+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32065"
53+
},
4454
{
4555
"type": "WEB",
4656
"url": "https://github.com/openclaw/openclaw/commit/03e689fc89bbecbcd02876a95957ef1ad9caa176"
4757
},
4858
{
4959
"type": "PACKAGE",
5060
"url": "https://github.com/openclaw/openclaw"
61+
},
62+
{
63+
"type": "WEB",
64+
"url": "https://www.vulncheck.com/advisories/openclaw-approval-identity-mismatch-in-system-run-command-execution"
5165
}
5266
],
5367
"database_specific": {
5468
"cwe_ids": [
5569
"CWE-436",
5670
"CWE-863"
5771
],
58-
"severity": "HIGH",
72+
"severity": "MODERATE",
5973
"github_reviewed": true,
6074
"github_reviewed_at": "2026-03-02T23:33:08Z",
6175
"nvd_published_at": null

advisories/github-reviewed/2026/03/GHSA-vjp8-wprm-2jw9/GHSA-vjp8-wprm-2jw9.json

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,21 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vjp8-wprm-2jw9",
4-
"modified": "2026-03-04T18:56:10Z",
4+
"modified": "2026-03-30T13:42:54Z",
55
"published": "2026-03-04T18:56:10Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2026-32067"
8+
],
79
"summary": "OpenClaw has cross-account DM pairing authorization bypass via unscoped pairing store access",
810
"details": "### Summary\nOpenClaw had account-scope gaps in pairing-store access for DM pairing policy, which could let a pairing approval from one account authorize the same sender on another account in multi-account setups.\n\n### Impact\nThis is an authorization-boundary weakness in multi-account channel deployments. A sender approved in one account could be accepted in another account before explicit approval there.\n\n### Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Latest published version affected: `2026.2.25`\n- Vulnerable range: `<= 2026.2.25`\n- Patched version (planned next release): `>= 2026.2.26`\n\n### Fix\nOpenClaw now enforces account-scoped pairing reads/writes consistently across core and extension message channels, with stricter runtime/SDK helpers and shared policy wiring to prevent cross-account pairing bleed.\n\n### Fix Commit(s)\n- `a0c5e28f3bf0cc0cd9311f9e9ec2ca0352550dcf`\n- `bce643a0bd145d3e9cb55400af33bd1b85baeb02`\n\n### Release Process Note\n`patched_versions` is pre-set to the planned next release (`2026.2.26`). After npm publish of that version, this advisory is ready to publish without further content edits.\n\nOpenClaw thanks @tdjackey for reporting.",
911
"severity": [
1012
{
1113
"type": "CVSS_V3",
1214
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
1319
}
1420
],
1521
"affected": [
@@ -41,6 +47,10 @@
4147
"type": "WEB",
4248
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-vjp8-wprm-2jw9"
4349
},
50+
{
51+
"type": "ADVISORY",
52+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32067"
53+
},
4454
{
4555
"type": "WEB",
4656
"url": "https://github.com/openclaw/openclaw/commit/a0c5e28f3bf0cc0cd9311f9e9ec2ca0352550dcf"
@@ -52,6 +62,10 @@
5262
{
5363
"type": "PACKAGE",
5464
"url": "https://github.com/openclaw/openclaw"
65+
},
66+
{
67+
"type": "WEB",
68+
"url": "https://www.vulncheck.com/advisories/openclaw-cross-account-authorization-bypass-in-dm-pairing-store"
5569
}
5670
],
5771
"database_specific": {

0 commit comments

Comments
 (0)