Skip to content

Commit 7b4e6bb

Browse files
1 parent 340df12 commit 7b4e6bb

2 files changed

Lines changed: 19 additions & 6 deletions

File tree

advisories/github-reviewed/2026/03/GHSA-5gj7-jf77-q2q2/GHSA-5gj7-jf77-q2q2.json

Lines changed: 16 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,21 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5gj7-jf77-q2q2",
4-
"modified": "2026-03-19T22:19:52Z",
4+
"modified": "2026-03-30T13:21:53Z",
55
"published": "2026-03-03T21:34:45Z",
66
"aliases": [
77
"CVE-2026-32009"
88
],
99
"summary": "OpenClaw: safeBins static default trusted dirs allow writable-dir binary hijack (`jq`)",
1010
"details": "### Summary\nIn `openclaw<=2026.2.23`, safe-bin trust in allowlist mode relied on static default trusted directories that included package-manager paths (notably `/opt/homebrew/bin` and `/usr/local/bin`).\nWhen a same-name binary (for example `jq`) is placed in one of those trusted default directories, safe-bin evaluation can be satisfied and execute the attacker-controlled binary.\n\n### Impact\nThis is an exec allowlist `safeBins` policy bypass that can lead to command execution in the OpenClaw runtime context.\nSeverity is set to Medium given the required ability to write into trusted host binary directories.\n\n### Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Vulnerable versions: `<= 2026.2.23`\n- Patched versions: `>= 2026.2.24` (planned next npm release)\n- Latest published npm version at triage time (2026-02-24): `2026.2.23`\n\n### Root Cause\n- Default safe-bin trusted directories included package-manager/user-managed paths.\n- Trust decision was directory-membership only for resolved executable paths.\n\n### Remediation\n- Restrict default safe-bin trusted directories to immutable system paths: `/bin`, `/usr/bin`.\n- Require explicit operator opt-in for package-manager/user paths via `tools.exec.safeBinTrustedDirs`.\n\n### Fix Commit(s)\n- `b67e600bff696ff2ed9b470826590c0ce6b3bb0a`\n\n### Release Process Note\n`patched_versions` is pre-set to the planned next release (`2026.2.24`).\nOnce npm release `2026.2.24` is published, this advisory should be ready for publish without additional version edits.\n\nOpenClaw thanks @tdjackey for reporting.\n\n\n### Publication Update (2026-02-25)\n`openclaw@2026.2.24` is published on npm and contains the fix commit(s) listed above. This advisory now marks `>= 2026.2.24` as patched.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H"
15+
},
1216
{
1317
"type": "CVSS_V4",
14-
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
18+
"score": "CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -43,23 +47,32 @@
4347
"type": "WEB",
4448
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-5gj7-jf77-q2q2"
4549
},
50+
{
51+
"type": "ADVISORY",
52+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32009"
53+
},
4654
{
4755
"type": "WEB",
4856
"url": "https://github.com/openclaw/openclaw/commit/b67e600bff696ff2ed9b470826590c0ce6b3bb0a"
4957
},
5058
{
5159
"type": "PACKAGE",
5260
"url": "https://github.com/openclaw/openclaw"
61+
},
62+
{
63+
"type": "WEB",
64+
"url": "https://www.vulncheck.com/advisories/openclaw-binary-hijacking-via-static-default-trusted-directories-in-safebins"
5365
}
5466
],
5567
"database_specific": {
5668
"cwe_ids": [
69+
"CWE-426",
5770
"CWE-428",
5871
"CWE-829"
5972
],
6073
"severity": "HIGH",
6174
"github_reviewed": true,
6275
"github_reviewed_at": "2026-03-03T21:34:45Z",
63-
"nvd_published_at": null
76+
"nvd_published_at": "2026-03-19T22:16:33Z"
6477
}
6578
}

advisories/github-reviewed/2026/03/GHSA-v865-p3gq-hw6m/GHSA-v865-p3gq-hw6m.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-v865-p3gq-hw6m",
4-
"modified": "2026-03-20T21:13:18Z",
4+
"modified": "2026-03-30T13:21:06Z",
55
"published": "2026-03-03T21:25:52Z",
66
"aliases": [
77
"CVE-2026-32004"
@@ -15,7 +15,7 @@
1515
},
1616
{
1717
"type": "CVSS_V4",
18-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"
18+
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N"
1919
}
2020
],
2121
"affected": [
@@ -80,7 +80,7 @@
8080
"cwe_ids": [
8181
"CWE-288"
8282
],
83-
"severity": "MODERATE",
83+
"severity": "HIGH",
8484
"github_reviewed": true,
8585
"github_reviewed_at": "2026-03-03T21:25:52Z",
8686
"nvd_published_at": "2026-03-19T22:16:32Z"

0 commit comments

Comments
 (0)