Skip to content

Commit b14e3d5

Browse files
1 parent 8587b72 commit b14e3d5

3 files changed

Lines changed: 23 additions & 7 deletions

File tree

advisories/github-reviewed/2026/03/GHSA-8fmp-37rc-p5g7/GHSA-8fmp-37rc-p5g7.json

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,21 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8fmp-37rc-p5g7",
4-
"modified": "2026-03-19T18:34:44Z",
4+
"modified": "2026-04-08T19:26:19Z",
55
"published": "2026-03-03T19:53:02Z",
66
"aliases": [
77
"CVE-2026-22177"
88
],
99
"summary": "OpenClaw's config env vars allowed startup env injection into service runtime",
1010
"details": "### Summary\nOpenClaw allowed dangerous process-control environment variables from `env.vars` (for example `NODE_OPTIONS`, `LD_*`, `DYLD_*`) to flow into gateway service runtime environments, enabling startup-time code execution in the OpenClaw process context.\n\n### Details\n`collectConfigEnvVars()` accepted unfiltered keys from config and those values were merged into the daemon install environment in `buildGatewayInstallPlan()`. Before the fix, startup-control variables were not blocked in this path.\n\n### Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Latest published affected version: `2026.2.19-2` (published February 19, 2026)\n- Affected range (structured): `<=2026.2.19-2 || =2026.2.19`\n- Patched version (pre-set for next release): `>= 2026.2.21`\n\n### Fix Commit(s)\n- `2cdbadee1f8fcaa93302d7debbfc529e19868ea4`\n\n### Release Process Note\n`patched_versions` is pre-set to the planned next release (`2026.2.21`). Once that npm release is published, this advisory is ready to publish without further content edits.\n\nOpenClaw thanks @tdjackey for reporting.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
15+
},
1216
{
1317
"type": "CVSS_V4",
14-
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
18+
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N"
1519
}
1620
],
1721
"affected": [
@@ -40,6 +44,10 @@
4044
"type": "WEB",
4145
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-8fmp-37rc-p5g7"
4246
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-w9j9-w4cp-6wgr"
50+
},
4351
{
4452
"type": "ADVISORY",
4553
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22177"
@@ -61,7 +69,7 @@
6169
"cwe_ids": [
6270
"CWE-15"
6371
],
64-
"severity": "HIGH",
72+
"severity": "MODERATE",
6573
"github_reviewed": true,
6674
"github_reviewed_at": "2026-03-03T19:53:02Z",
6775
"nvd_published_at": "2026-03-18T02:16:21Z"

advisories/github-reviewed/2026/04/GHSA-3xxc-pwj6-jgrj/GHSA-3xxc-pwj6-jgrj.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3xxc-pwj6-jgrj",
4-
"modified": "2026-04-08T15:00:23Z",
4+
"modified": "2026-04-08T19:26:29Z",
55
"published": "2026-04-08T15:00:23Z",
66
"aliases": [
77
"CVE-2026-33753"
@@ -43,6 +43,10 @@
4343
"type": "WEB",
4444
"url": "https://github.com/trailofbits/rfc3161-client/security/advisories/GHSA-3xxc-pwj6-jgrj"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33753"
49+
},
4650
{
4751
"type": "WEB",
4852
"url": "https://github.com/trailofbits/rfc3161-client/commit/4f7d372297b4fba7b0119e9f954e4495ec0592c0"
@@ -63,6 +67,6 @@
6367
"severity": "MODERATE",
6468
"github_reviewed": true,
6569
"github_reviewed_at": "2026-04-08T15:00:23Z",
66-
"nvd_published_at": null
70+
"nvd_published_at": "2026-04-08T16:16:23Z"
6771
}
6872
}

advisories/github-reviewed/2026/04/GHSA-h259-74h5-4rh9/GHSA-h259-74h5-4rh9.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-h259-74h5-4rh9",
4-
"modified": "2026-04-08T15:00:17Z",
4+
"modified": "2026-04-08T19:26:25Z",
55
"published": "2026-04-08T15:00:17Z",
66
"aliases": [
77
"CVE-2026-33229"
@@ -97,6 +97,10 @@
9797
"type": "WEB",
9898
"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h259-74h5-4rh9"
9999
},
100+
{
101+
"type": "ADVISORY",
102+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33229"
103+
},
100104
{
101105
"type": "WEB",
102106
"url": "https://github.com/xwiki/xwiki-platform/commit/9fe84da66184c05953df9466cf3a4acd15a46e63"
@@ -121,6 +125,6 @@
121125
"severity": "HIGH",
122126
"github_reviewed": true,
123127
"github_reviewed_at": "2026-04-08T15:00:17Z",
124-
"nvd_published_at": null
128+
"nvd_published_at": "2026-04-08T16:16:23Z"
125129
}
126130
}

0 commit comments

Comments
 (0)