Skip to content

Commit 85e92d7

Browse files
1 parent 7b4e6bb commit 85e92d7

2 files changed

Lines changed: 17 additions & 5 deletions

File tree

advisories/github-reviewed/2026/03/GHSA-g75x-8qqm-2vxp/GHSA-g75x-8qqm-2vxp.json

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,21 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g75x-8qqm-2vxp",
4-
"modified": "2026-03-19T22:21:28Z",
4+
"modified": "2026-03-30T13:26:17Z",
55
"published": "2026-03-03T22:08:26Z",
66
"aliases": [
77
"CVE-2026-32015"
88
],
99
"summary": "OpenClaw's `tools.exec.safeBins` PATH-hijack allowed trojan binaries to bypass allowlist checks",
1010
"details": "## Summary\n\n`tools.exec.safeBins` allowlist checks could be bypassed by PATH-hijacked binaries, allowing execution of attacker-controlled trojan binaries under an allowlisted executable name.\n\n## Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Latest published version at triage time: `2026.2.17`\n- Affected range: `>= 2026.1.21 < 2026.2.18`\n- Patched version: `2026.2.19`\n\n## Impact\n\nIn allowlist mode, `safeBins` validation previously accepted a resolved executable path based on executable name and argument shape, without enforcing trusted executable directories. If an attacker could influence process PATH resolution before gateway startup (or otherwise control the gateway launch environment), a trojan binary with an allowlisted name (for example `jq`) could be executed.\n\n## Severity Rationale\n\nThis issue is rated `medium` because exploitation requires an additional precondition: influencing the gateway process PATH / launch environment. Request-scoped PATH injection is blocked for host execution.\n\n## Fix\n\n`safeBins` now requires the resolved executable path to come from trusted bin directories (system defaults plus gateway startup PATH), closing the bypass.\n\n## Fix Commit(s)\n\n- 28bac46c92069dc728524fbf383024c1b64e5c23\n\nOpenClaw thanks @jackhax for reporting.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
15+
},
1216
{
1317
"type": "CVSS_V4",
14-
"score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
18+
"score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -40,13 +44,21 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-g75x-8qqm-2vxp"
4246
},
47+
{
48+
"type": "ADVISORY",
49+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-32015"
50+
},
4351
{
4452
"type": "WEB",
4553
"url": "https://github.com/openclaw/openclaw/commit/28bac46c92069dc728524fbf383024c1b64e5c23"
4654
},
4755
{
4856
"type": "PACKAGE",
4957
"url": "https://github.com/openclaw/openclaw"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://www.vulncheck.com/advisories/openclaw-path-hijacking-bypass-in-tools-exec-safebins-allowlist-validation"
5062
}
5163
],
5264
"database_specific": {
@@ -57,6 +69,6 @@
5769
"severity": "HIGH",
5870
"github_reviewed": true,
5971
"github_reviewed_at": "2026-03-03T22:08:26Z",
60-
"nvd_published_at": null
72+
"nvd_published_at": "2026-03-19T22:16:34Z"
6173
}
6274
}

advisories/github-reviewed/2026/03/GHSA-q6qf-4p5j-r25g/GHSA-q6qf-4p5j-r25g.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-q6qf-4p5j-r25g",
4-
"modified": "2026-03-20T21:14:03Z",
4+
"modified": "2026-03-30T13:26:46Z",
55
"published": "2026-03-04T19:13:48Z",
66
"aliases": [
77
"CVE-2026-32002"
@@ -15,7 +15,7 @@
1515
},
1616
{
1717
"type": "CVSS_V4",
18-
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
1919
}
2020
],
2121
"affected": [

0 commit comments

Comments
 (0)