Skip to content

File tree

16 files changed

+104
-31
lines changed

16 files changed

+104
-31
lines changed

advisories/github-reviewed/2026/04/GHSA-32vr-5gcf-3pw2/GHSA-32vr-5gcf-3pw2.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-32vr-5gcf-3pw2",
4-
"modified": "2026-04-08T19:17:11Z",
4+
"modified": "2026-04-09T14:29:45Z",
55
"published": "2026-04-08T19:17:11Z",
66
"aliases": [
77
"CVE-2026-39890"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-32vr-5gcf-3pw2"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39890"
49+
},
4650
{
4751
"type": "PACKAGE",
4852
"url": "https://github.com/MervinPraison/PraisonAI"
@@ -59,6 +63,6 @@
5963
"severity": "CRITICAL",
6064
"github_reviewed": true,
6165
"github_reviewed_at": "2026-04-08T19:17:11Z",
62-
"nvd_published_at": null
66+
"nvd_published_at": "2026-04-08T21:17:01Z"
6367
}
6468
}

advisories/github-reviewed/2026/04/GHSA-3j3q-wp9x-585p/GHSA-3j3q-wp9x-585p.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3j3q-wp9x-585p",
4-
"modified": "2026-04-08T15:04:23Z",
4+
"modified": "2026-04-09T14:28:52Z",
55
"published": "2026-04-08T15:04:22Z",
66
"aliases": [
77
"CVE-2026-39429"
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://github.com/kcp-dev/kcp/security/advisories/GHSA-3j3q-wp9x-585p"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39429"
65+
},
6266
{
6367
"type": "PACKAGE",
6468
"url": "https://github.com/kcp-dev/kcp"
@@ -74,12 +78,13 @@
7478
],
7579
"database_specific": {
7680
"cwe_ids": [
81+
"CWE-302",
7782
"CWE-306",
7883
"CWE-862"
7984
],
8085
"severity": "HIGH",
8186
"github_reviewed": true,
8287
"github_reviewed_at": "2026-04-08T15:04:22Z",
83-
"nvd_published_at": null
88+
"nvd_published_at": "2026-04-08T21:16:59Z"
8489
}
8590
}

advisories/github-reviewed/2026/04/GHSA-56p5-8mhr-2fph/GHSA-56p5-8mhr-2fph.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-56p5-8mhr-2fph",
4-
"modified": "2026-04-08T15:03:47Z",
4+
"modified": "2026-04-09T14:28:22Z",
55
"published": "2026-04-08T15:03:47Z",
66
"aliases": [
77
"CVE-2026-35525"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://github.com/harttle/liquidjs/security/advisories/GHSA-56p5-8mhr-2fph"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-35525"
49+
},
4650
{
4751
"type": "WEB",
4852
"url": "https://github.com/harttle/liquidjs/pull/867"
@@ -63,6 +67,6 @@
6367
"severity": "HIGH",
6468
"github_reviewed": true,
6569
"github_reviewed_at": "2026-04-08T15:03:47Z",
66-
"nvd_published_at": null
70+
"nvd_published_at": "2026-04-08T20:16:24Z"
6771
}
6872
}

advisories/github-reviewed/2026/04/GHSA-5mwj-v5jw-5c97/GHSA-5mwj-v5jw-5c97.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5mwj-v5jw-5c97",
4-
"modified": "2026-04-08T15:04:30Z",
4+
"modified": "2026-04-09T14:28:56Z",
55
"published": "2026-04-08T15:04:30Z",
66
"aliases": [
77
"CVE-2026-39411"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://github.com/lobehub/lobehub/security/advisories/GHSA-5mwj-v5jw-5c97"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39411"
49+
},
4650
{
4751
"type": "WEB",
4852
"url": "https://github.com/lobehub/lobehub/pull/13535"
@@ -69,6 +73,6 @@
6973
"severity": "MODERATE",
7074
"github_reviewed": true,
7175
"github_reviewed_at": "2026-04-08T15:04:30Z",
72-
"nvd_published_at": null
76+
"nvd_published_at": "2026-04-08T20:16:25Z"
7377
}
7478
}

advisories/github-reviewed/2026/04/GHSA-f292-66h9-fpmf/GHSA-f292-66h9-fpmf.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-f292-66h9-fpmf",
4-
"modified": "2026-04-08T19:21:14Z",
4+
"modified": "2026-04-09T14:29:15Z",
55
"published": "2026-04-08T19:21:14Z",
66
"aliases": [
77
"CVE-2026-39889"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-f292-66h9-fpmf"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39889"
49+
},
4650
{
4751
"type": "PACKAGE",
4852
"url": "https://github.com/MervinPraison/PraisonAI"
@@ -59,6 +63,6 @@
5963
"severity": "HIGH",
6064
"github_reviewed": true,
6165
"github_reviewed_at": "2026-04-08T19:21:14Z",
62-
"nvd_published_at": null
66+
"nvd_published_at": "2026-04-08T21:17:01Z"
6367
}
6468
}

advisories/github-reviewed/2026/04/GHSA-gjw9-34gf-rp6m/GHSA-gjw9-34gf-rp6m.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-gjw9-34gf-rp6m",
4-
"modified": "2026-04-03T21:53:32Z",
4+
"modified": "2026-04-09T14:28:10Z",
55
"published": "2026-04-03T21:53:32Z",
66
"aliases": [
77
"CVE-2026-25044"
88
],
99
"summary": "Budibase: Command Injection in Bash Automation Step",
1010
"details": "**Location**: `packages/server/src/automations/steps/bash.ts` \n\n#### Description\nThe bash automation step executes user-provided commands using `execSync` without proper sanitization or validation. User input is processed through `processStringSync` which allows template interpolation, potentially allowing arbitrary command execution.\n\n#### Code Reference\n```21:28:packages/server/src/automations/steps/bash.ts\n const command = processStringSync(inputs.code, context)\n\n let stdout,\n success = true\n try {\n stdout = execSync(command, {\n timeout: environment.QUERY_THREAD_TIMEOUT,\n }).toString()\n```\n\n#### Attack Vector\nAn attacker with access to create or modify automations can inject malicious shell commands by including template syntax that evaluates to command injection payloads (e.g., `$(rm -rf /)`, `; malicious-command`, `| malicious-command`).\n\n#### Impact\n- Remote code execution (RCE)\n- Complete system compromise\n- Data exfiltration\n- Lateral movement within the infrastructure\n\n#### Recommendation\n1. **Immediate**: Disable bash automation step in production until fixed\n2. Implement a whitelist of allowed commands\n3. Use parameterized command execution with proper escaping\n4. Implement command argument validation\n5. Consider using a restricted shell or command sandboxing\n6. Add rate limiting and monitoring for command execution\n\n#### Example Fix\n```typescript\nimport { spawn } from \"child_process\"\n\n// Validate against whitelist\nconst ALLOWED_COMMANDS = [\"echo\", \"date\", \"pwd\"] // Extend as needed\n\nfunction sanitizeCommand(input: string): string {\n // Remove dangerous characters and command chaining\n return input.replace(/[;&|`$(){}[\\]]/g, \"\").trim()\n}\n\nfunction validateCommand(cmd: string): boolean {\n const parts = cmd.split(/\\s+/)\n return ALLOWED_COMMANDS.includes(parts[0])\n}\n\nexport async function run({ inputs, context }) {\n if (!inputs.code) {\n return { stdout: \"Budibase bash automation failed: Invalid inputs\" }\n }\n\n const processedCommand = processStringSync(inputs.code, context)\n const sanitized = sanitizeCommand(processedCommand)\n \n if (!validateCommand(sanitized)) {\n return {\n success: false,\n stdout: \"Command not allowed\"\n }\n }\n\n // Use spawn instead of execSync with proper argument handling\n return new Promise((resolve) => {\n const [command, ...args] = sanitized.split(/\\s+/)\n const proc = spawn(command, args, {\n timeout: environment.QUERY_THREAD_TIMEOUT,\n })\n \n let stdout = \"\"\n proc.stdout.on(\"data\", (data) => { stdout += data })\n proc.on(\"close\", (code) => {\n resolve({ stdout, success: code === 0 })\n })\n })\n}\n```",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
15+
},
1216
{
1317
"type": "CVSS_V4",
1418
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"

advisories/github-reviewed/2026/04/GHSA-hfvc-g4fc-pqhx/GHSA-hfvc-g4fc-pqhx.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hfvc-g4fc-pqhx",
4-
"modified": "2026-04-08T19:22:12Z",
4+
"modified": "2026-04-09T14:29:41Z",
55
"published": "2026-04-08T19:22:12Z",
66
"aliases": [
77
"CVE-2026-39883"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://github.com/open-telemetry/opentelemetry-go/security/advisories/GHSA-hfvc-g4fc-pqhx"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39883"
49+
},
4650
{
4751
"type": "PACKAGE",
4852
"url": "https://github.com/open-telemetry/opentelemetry-go"
@@ -59,6 +63,6 @@
5963
"severity": "HIGH",
6064
"github_reviewed": true,
6165
"github_reviewed_at": "2026-04-08T19:22:12Z",
62-
"nvd_published_at": null
66+
"nvd_published_at": "2026-04-08T21:17:00Z"
6367
}
6468
}

advisories/github-reviewed/2026/04/GHSA-hwg5-x759-7wjg/GHSA-hwg5-x759-7wjg.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hwg5-x759-7wjg",
4-
"modified": "2026-04-08T19:21:22Z",
4+
"modified": "2026-04-09T14:29:49Z",
55
"published": "2026-04-08T19:21:22Z",
66
"aliases": [
77
"CVE-2026-39891"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://github.com/MervinPraison/PraisonAI/security/advisories/GHSA-hwg5-x759-7wjg"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39891"
49+
},
4650
{
4751
"type": "PACKAGE",
4852
"url": "https://github.com/MervinPraison/PraisonAI"
@@ -59,6 +63,6 @@
5963
"severity": "HIGH",
6064
"github_reviewed": true,
6165
"github_reviewed_at": "2026-04-08T19:21:22Z",
62-
"nvd_published_at": null
66+
"nvd_published_at": "2026-04-08T21:17:01Z"
6367
}
6468
}

advisories/github-reviewed/2026/04/GHSA-mmg9-6m6j-jqqx/GHSA-mmg9-6m6j-jqqx.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-mmg9-6m6j-jqqx",
4-
"modified": "2026-04-08T15:00:29Z",
4+
"modified": "2026-04-09T14:28:18Z",
55
"published": "2026-04-08T15:00:29Z",
66
"aliases": [
77
"CVE-2026-34166"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://github.com/harttle/liquidjs/security/advisories/GHSA-mmg9-6m6j-jqqx"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34166"
49+
},
4650
{
4751
"type": "WEB",
4852
"url": "https://github.com/harttle/liquidjs/commit/abc058be0f33d6372cd2216f4945183167abeb25"
@@ -63,6 +67,6 @@
6367
"severity": "LOW",
6468
"github_reviewed": true,
6569
"github_reviewed_at": "2026-04-08T15:00:29Z",
66-
"nvd_published_at": null
70+
"nvd_published_at": "2026-04-08T19:25:21Z"
6771
}
6872
}

advisories/github-reviewed/2026/04/GHSA-p423-j2cm-9vmq/GHSA-p423-j2cm-9vmq.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-p423-j2cm-9vmq",
4-
"modified": "2026-04-08T19:23:08Z",
4+
"modified": "2026-04-09T14:29:58Z",
55
"published": "2026-04-08T19:23:08Z",
66
"aliases": [
77
"CVE-2026-39892"
@@ -40,9 +40,17 @@
4040
"type": "WEB",
4141
"url": "https://github.com/pyca/cryptography/security/advisories/GHSA-p423-j2cm-9vmq"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-39892"
46+
},
4347
{
4448
"type": "PACKAGE",
4549
"url": "https://github.com/pyca/cryptography"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "http://www.openwall.com/lists/oss-security/2026/04/08/12"
4654
}
4755
],
4856
"database_specific": {
@@ -52,6 +60,6 @@
5260
"severity": "MODERATE",
5361
"github_reviewed": true,
5462
"github_reviewed_at": "2026-04-08T19:23:08Z",
55-
"nvd_published_at": null
63+
"nvd_published_at": "2026-04-08T21:17:01Z"
5664
}
5765
}

0 commit comments

Comments
 (0)