Skip to content

Commit cb8adc3

Browse files
1 parent cfe62ac commit cb8adc3

File tree

3 files changed

+39
-10
lines changed

3 files changed

+39
-10
lines changed

advisories/unreviewed/2026/03/GHSA-m6m4-34cj-4hh7/GHSA-m6m4-34cj-4hh7.json renamed to advisories/github-reviewed/2026/03/GHSA-m6m4-34cj-4hh7/GHSA-m6m4-34cj-4hh7.json

Lines changed: 31 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-m6m4-34cj-4hh7",
4-
"modified": "2026-03-21T00:31:42Z",
4+
"modified": "2026-03-23T21:50:51Z",
55
"published": "2026-03-21T00:31:42Z",
66
"aliases": [
77
"CVE-2026-4506"
88
],
9+
"summary": "MindSQL is vulnerable to Code Injection through its ask_db function",
910
"details": "A vulnerability was found in Mindinventory MindSQL up to 0.2.1. Impacted is the function ask_db of the file mindsql/core/mindsql_core.py. Performing a manipulation results in code injection. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.",
1011
"severity": [
1112
{
@@ -14,10 +15,30 @@
1415
},
1516
{
1617
"type": "CVSS_V4",
17-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "PyPI",
25+
"name": "mindsql"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"last_affected": "0.2.1"
36+
}
37+
]
38+
}
39+
]
1840
}
1941
],
20-
"affected": [],
2142
"references": [
2243
{
2344
"type": "ADVISORY",
@@ -27,6 +48,10 @@
2748
"type": "WEB",
2849
"url": "https://github.com/Ka7arotto/cve/blob/main/MindSQL-RCE.md"
2950
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/Mindinventory/MindSQL"
54+
},
3055
{
3156
"type": "WEB",
3257
"url": "https://vuldb.com/?ctiid.352072"
@@ -44,9 +69,9 @@
4469
"cwe_ids": [
4570
"CWE-74"
4671
],
47-
"severity": "MODERATE",
48-
"github_reviewed": false,
49-
"github_reviewed_at": null,
72+
"severity": "LOW",
73+
"github_reviewed": true,
74+
"github_reviewed_at": "2026-03-23T21:50:51Z",
5075
"nvd_published_at": "2026-03-20T22:16:29Z"
5176
}
5277
}

advisories/github-reviewed/2026/03/GHSA-r54r-wmmq-mh84/GHSA-r54r-wmmq-mh84.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-r54r-wmmq-mh84",
4-
"modified": "2026-03-03T21:20:14Z",
4+
"modified": "2026-03-23T21:51:24Z",
55
"published": "2026-03-03T21:20:14Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2026-28483"
8+
],
79
"summary": "OpenClaw: ZIP extraction race could write outside destination via parent symlink rebind",
810
"details": "### Summary\nZIP extraction in OpenClaw could be raced into writing outside the intended destination directory via parent-directory symlink rebind between validation and write.\n\n### Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Vulnerable versions: `<= 2026.3.1`\n- Latest published vulnerable version confirmed: `2026.3.1` (npm as of 2026-03-02)\n- Patched version: `2026.3.2` (released)\n\n### Technical Details\nIn `src/infra/archive.ts`, ZIP extraction previously validated output paths, then later opened/truncated the destination path in a separate step. A local race on parent-directory symlink state could redirect the final write outside the extraction root.\n\nThe fix hardens ZIP writes by binding writes to the opened file handle identity and avoiding the pre-write truncate race path, with shared fd realpath verification in `src/infra/fs-safe.ts` and regression coverage in `src/infra/archive.test.ts`.\n\n### Fix Commit(s)\n- `7dac9b05dd9d38dd3929637f26fa356fd8bdd107`",
911
"severity": [

advisories/github-reviewed/2026/03/GHSA-wr6m-jg37-68xh/GHSA-wr6m-jg37-68xh.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-wr6m-jg37-68xh",
4-
"modified": "2026-03-02T21:49:51Z",
4+
"modified": "2026-03-23T21:52:21Z",
55
"published": "2026-03-02T21:49:51Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2026-32066"
8+
],
79
"summary": "OpenClaw has unbounded memory growth in Zalo webhook via query-string key churn (unauthenticated DoS)",
810
"details": "### Summary\nUnauthenticated requests to a reachable Zalo webhook endpoint could trigger unbounded in-memory key growth by varying query strings on the same valid webhook route.\n\n### Impact\nAn attacker could cause memory pressure and potential process instability or OOM, degrading availability.\n\n### Fix\nWebhook security tracking now normalizes keys to matched webhook path semantics (query excluded) and bounds/prunes tracking state to prevent unbounded growth.\n\n### Affected and Patched Versions\n- Affected: `<= 2026.2.26`\n- Patched: `2026.3.1`",
911
"severity": [

0 commit comments

Comments
 (0)