Live feed · 2026-04-24

Open Source
Daily Catch

Automated patch intelligence — GHSA advisories analyzed with LLM classification, cross-ecosystem pattern correlation, and fix quality scoring.

297 Advisories
41 Patterns
Critical
Languages
Top recurring patterns
    Language breakdown
      Advisory volume over time
      Severity distribution
      Ecosystem coverage
      GHSA-v529-vhwc-wfc5 CRITICAL 9.6 UNSANITIZED_INPUT→SQL Ruby
      Package
      openc3 · OpenC3/cosmos
      Root cause
      The application directly embedded user-controlled input (start_time, end_time, col_name) into SQL queries without proper sanitization or parameterization. This allowed an attacker to inject arbitrary SQL code by crafting malicious input values.
      GHSA-8h25-q488-4hxw HIGH 8.8 UNSANITIZED_INPUT→COMMAND JavaScript
      Package
      openlearnx · th30d4y/OpenLearnX
      Root cause
      The application allowed users to execute arbitrary code in a sandboxed environment (Docker containers). However, the initial sandbox implementation for Python lacked robust static analysis to prevent the import of dangerous modules or the use of sensitive functions, enabling an attacker to escape the sandbox and execute arbitrary commands on the host system.
      GHSA-m8mh-x359-vm8m HIGH 7.1 PATH_TRAVERSAL→FILE_WRITE Java
      Package
      org.apktool:apktool-lib · iBotPeaches/Apktool
      Root cause
      The application constructed file paths for output by concatenating user-controlled input (entry.getTypeName(), entry.getConfig().getQualifiers(), entry.getName(), and ext) without sufficient sanitization. Although there was a `detectPossibleDirectoryTraversal` check, it was bypassed, allowing an attacker to inject path traversal sequences like `../` into the generated `outResPath`.
      GHSA-88gm-j2wx-58h6 LOW 2.2 SSRF→INTERNAL_ACCESS JavaScript
      Package
      @astrojs/cloudflare · withastro/astro
      Root cause
      The application's image-binding-transform endpoint fetched remote images without explicitly controlling redirect behavior. This allowed an attacker to provide a URL that would redirect to an internal resource, effectively bypassing previous SSRF mitigations.
      GHSA-246w-jgmq-88fg CRITICAL 10.0 MISSING_AUTH→ENDPOINT Go
      Package
      github.com/jkroepke/openvpn-auth-oauth2 · jkroepke/openvpn-auth-oauth2
      Root cause
      The application incorrectly returned 'FUNC_SUCCESS' even when a client's authentication was explicitly denied or an error occurred during the authentication process. This misinterpretation of the return code by OpenVPN led to clients being granted access despite failing authentication.
      GHSA-6973-8887-87ff CRITICAL 9.6 INTEGER_OVERFLOW→BOUNDARY RUST
      Package
      nimiq-block · nimiq/core-rs-albatross
      Root cause
      The vulnerability stemmed from improper validation of `BitSet` indices representing validator slots. An attacker could craft a `BitSet` with out-of-range indices or indices that, when truncated to `u16`, would map to valid slots. This allowed them to bypass the quorum check for skip blocks and equivocation proofs by making it appear as if enough validators had signed, even if they hadn't.
      GHSA-c3h8-g69v-pjrg HIGH 8.6 UNSANITIZED_INPUT→HEADER JavaScript
      Package
      i18next-http-middleware · i18next/i18next-http-middleware
      Root cause
      The application failed to properly sanitize user-controlled input, specifically the 'Content-Language' header and language/namespace identifiers. This allowed attackers to inject control characters into HTTP headers, leading to response splitting, and to use specially crafted strings (e.g., '__proto__', '..', '/', '\') to trigger prototype pollution, path traversal, or denial-of-service conditions when these values were used in internal operations or forwarded to backend connectors.
      GHSA-wgx6-g857-jjf7 HIGH 8.1 PRIVILEGE_ESCALATION→ROLE Ruby
      Package
      openc3 · OpenC3/cosmos
      Root cause
      The `verify_no_service` method, intended to verify either a password or a session token, had a flaw where it would prioritize checking for a session token even when explicitly told to only check for a password. This meant that if an attacker had a valid session token, they could use it in place of a password to perform actions that should require the actual user's password, such as resetting the password.
      GHSA-4948-f92q-f432 HIGH 7.5 UNSANITIZED_INPUT→SQL JavaScript
      Package
      @nocobase/database · nocobase/nocobase
      Root cause
      The application constructed SQL queries by directly concatenating user-controlled input (e.g., `scopeValue`, `nodeIds`) into the SQL string without proper sanitization or using parameterized queries. This allowed an attacker to inject arbitrary SQL code.
      GHSA-7c4j-2m43-2mgh HIGH 7.5 DOS→RESOURCE_EXHAUSTION RUST
      Package
      nimiq-primitives · nimiq/core-rs-albatross
      Root cause
      The vulnerability stemmed from insufficient validation of BLS voting keys within election macro block proposals. An attacker could craft a block containing an invalid BLS public key that, when processed by a node, would cause a panic (uncompress().unwrap()) during the hashing or verification process, leading to a node crash.
      GHSA-w937-fg2h-xhq2 HIGH 7.5 UNSANITIZED_INPUT→XSS JavaScript
      Package
      locize · locize/locize
      Root cause
      The vulnerability stemmed from two main issues: a lack of origin validation for incoming postMessage events and insufficient sanitization of HTML content and attribute values provided by the InContext editor. An attacker could send malicious messages from any origin, which would then be processed and potentially lead to script execution or attribute manipulation.
      GHSA-wrwh-c28m-9jjh HIGH 7.2 UNSANITIZED_INPUT→SQL JavaScript
      Package
      @nocobase/plugin-collection-sql · nocobase/nocobase
      Root cause
      The vulnerability existed because the 'update' action in the SQL resource did not properly validate user-supplied SQL queries. While a 'checkSQL' function was available for validation, it was not called for the 'update' operation, allowing malicious SQL to be processed.
      GHSA-xjvc-pw2r-6878 MODERATE 4.9 PATH_TRAVERSAL→FILE_READ PHP
      Package
      flarum/core · flarum/framework
      Root cause
      The previous fix for CVE-2023-27577 only restricted dangerous LESS features like `@import` and `data-uri()` in the `custom_less` setting. However, other settings, such as theme color settings, were also interpolated directly into the LESS source without similar restrictions, allowing an attacker to inject these features through those variables.
      GHSA-4jvx-93h3-f45h MODERATE 4.3 PATH_TRAVERSAL→FILE_WRITE Ruby
      Package
      openc3 · OpenC3/cosmos
      Root cause
      The application allowed user-supplied input for 'tool' and 'name' parameters to be used directly in file path constructions when saving or loading configurations. This lack of input validation meant that an attacker could inject path traversal sequences (e.g., '..', '/', '\') to manipulate the intended file paths.
      GHSA-29v9-frvh-c426 HIGH 0.0 SSRF→INTERNAL_ACCESS Go
      Package
      github.com/monetr/monetr · monetr/monetr
      Root cause
      The application allowed an attacker to specify an arbitrary URL for the Lunch Flow API, which was then used to make server-side requests. There was no validation or allowlist in place to restrict the target URLs, enabling the server to connect to internal networks or other arbitrary external services.
      GHSA-8c75-8mhr-p7r9 HIGH 0.0 BUFFER_OVERFLOW→HEAP RUST
      Package
      openssl · rust-openssl/rust-openssl
      Root cause
      The `unwrap_key` function in `rust-openssl` contained an incorrect assertion for the output buffer size. It incorrectly checked if `out.len() + 8 <= in_.len()` (output buffer size plus 8 bytes for integrity check was less than or equal to input length), instead of `out.len() + 8 >= in_.len()` (output buffer size plus 8 bytes was greater than or equal to input length). This logic error meant that the function would not panic if the output buffer was too small to hold the unwrapped key, potentially leading to a buffer overflow when `ffi::AES_unwrap_key` attempts to write beyond the allocated `out` buffer.
      GHSA-f6ww-3ggp-fr8h HIGH 0.0 UNCLASSIFIED JavaScript
      Package
      xmldom · xmldom/xmldom
      Root cause
      The xmldom library did not validate the `publicId`, `systemId`, and `internalSubset` properties of a `DocumentType` node during serialization. This allowed an attacker to inject arbitrary XML content into the Document Type Declaration (DTD) when an XML document was serialized, bypassing well-formedness checks.
      GHSA-ghm9-cr32-g9qj HIGH 0.0 BUFFER_OVERFLOW→HEAP RUST
      Package
      openssl · rust-openssl/rust-openssl
      Root cause
      The `digest_final` function in `rust-openssl` did not perform a length check to ensure that the provided output buffer was large enough to hold the entire digest. It would attempt to write the digest into the buffer regardless of its size, potentially writing past the allocated memory.
      GHSA-hjh7-r5w8-5872 HIGH 0.0 PATH_TRAVERSAL→FILE_READ Go
      Package
      github.com/siyuan-note/siyuan/kernel · siyuan-note/siyuan
      Root cause
      The application failed to properly validate user-supplied paths in the `/export/` endpoint, specifically when dealing with double URL encoded characters. An incomplete fix for a previous vulnerability allowed attackers to bypass path sanitization by double-encoding path traversal sequences (e.g., `%252e%252e%252f`), leading to access outside the intended export directory.
      GHSA-hppc-g8h3-xhp3 HIGH 0.0 INFO_DISCLOSURE→ERROR_MESSAGE RUST
      Package
      openssl · rust-openssl/rust-openssl
      Root cause
      The vulnerability stemmed from an unchecked return value from user-provided callbacks in PSK and cookie handling. These callbacks were expected to write data into a provided buffer and return the length of the data written. However, the `rust-openssl` library did not verify if the returned length exceeded the actual capacity of the buffer, leading to a potential out-of-bounds read.
      GHSA-j88v-2chj-qfwx LOW 0.0 UNSANITIZED_INPUT→SQL Go
      Package
      github.com/jackc/pgx · jackc/pgx
      Root cause
      The vulnerability stemmed from the SQL lexer's failure to correctly parse PostgreSQL dollar-quoted string literals. When sanitizing SQL queries, the lexer would incorrectly identify placeholders (e.g., $1, $2) within these dollar-quoted strings, leading to premature substitution and potential injection if an attacker could control parts of the query.
      GHSA-p3h2-2j4p-p83g HIGH 0.0 PATH_TRAVERSAL→FILE_DELETE JavaScript
      Package
      @samanhappy/mcphub · samanhappy/mcphub
      Root cause
      The application used user-supplied input (manifest.name) directly in file path operations without proper validation or sanitization. This allowed an attacker to inject path traversal sequences (e.g., '..') into the server name, causing file operations to occur outside the intended directory.
      GHSA-pqf5-4pqq-29f5 HIGH 0.0 BUFFER_OVERFLOW→HEAP RUST
      Package
      openssl · rust-openssl/rust-openssl
      Root cause
      On OpenSSL 1.1.x, certain key derivation methods (like X25519, X448, HKDF-extract) ignored the provided buffer length and unconditionally wrote the full natural output size. If the caller provided a buffer shorter than this natural size, an out-of-bounds write would occur.
      GHSA-x6wf-f3px-wcqx HIGH 0.0 UNCLASSIFIED JavaScript
      Package
      xmldom · xmldom/xmldom
      Root cause
      The `xmldom` library's `createProcessingInstruction` function did not perform input validation on the `target` and `data` arguments. This allowed attackers to inject malformed processing instructions that could lead to XML node injection during serialization if the `requireWellFormed` option was not enabled.
      GHSA-xmgf-hq76-4vx2 LOW 0.0 BUFFER_OVERFLOW→HEAP RUST
      Package
      openssl · rust-openssl/rust-openssl
      Root cause
      The vulnerability existed because the `openssl` crate's PEM password callback trampoline did not validate the length returned by the user-provided callback. If the callback returned a length greater than the actual buffer size, it could lead to an out-of-bounds read when OpenSSL attempted to use this oversized length to derive the decryption key.
      GHSA-2gw9-c2r2-f5qf HIGH 8.8 PRIVILEGE_ESCALATION→ROLE Go
      Package
      github.com/m1k1o/neko/server · m1k1o/neko
      Root cause
      The application allowed authenticated users to update their profile without proper authorization checks on all fields. Specifically, the `IsAdmin` field within the user's session profile could be modified by a non-admin user through the `UpdateProfile` API endpoint.
      GHSA-m6rx-7pvw-2f73 HIGH 8.4 UNCLASSIFIED JavaScript
      Package
      @gitlawb/openclaude · Gitlawb/openclaude
      Root cause
      The vulnerability existed because the sandbox permission check logic had an early-exit flaw. It only explicitly handled 'passthrough' behavior, allowing 'deny' or 'ask' behaviors to implicitly bypass the intended security checks and proceed as if permission was granted.
      GHSA-7gcj-phff-2884 HIGH 7.5 DOS→RESOURCE_EXHAUSTION JavaScript
      Package
      signalk-server · SignalK/signalk-server
      Root cause
      The vulnerability description mentions an "Unauthenticated Regular Expression Denial of Service (ReDoS) via WebSocket Subscription Paths". However, the provided diff primarily addresses a different issue: the lack of rate limiting for login attempts over WebSockets. Previously, only HTTP login attempts were rate-limited using 'express-rate-limit'. WebSocket login attempts were not subject to any rate limiting, allowing an attacker to make an unlimited number of login attempts.
      GHSA-rmx9-2pp3-xhcr MODERATE 6.5 RACE_CONDITION→TOCTOU Go
      Package
      github.com/tektoncd/pipeline · tektoncd/pipeline
      Root cause
      The vulnerability existed because the VerificationPolicy was being listed multiple times within a single reconcile loop, specifically for each pipeline task. This repeated listing could lead to inconsistencies or race conditions, allowing an attacker to bypass the intended regex pattern matching for trusted resources by manipulating the timing or state of the policies.
      GHSA-grp3-h8m8-45p7 MODERATE 6.3 UNSANITIZED_INPUT→NOSQL Python
      Package
      glances · nicolargo/glances
      Root cause
      The Glances Cassandra export module constructed CQL queries using configuration values (keyspace and table names) directly without proper validation or sanitization. An attacker could inject malicious CQL into these configuration parameters, which would then be executed by the Cassandra client.
      GHSA-xq8m-7c5p-c2r6 MODERATE 5.4 INSECURE_DEFAULT→CONFIG JavaScript
      Package
      @auth0/nextjs-auth0 · auth0/nextjs-auth0
      Root cause
      The Auth0 Next.js SDK was caching the entire `Fetcher` instance, including its `getAccessToken` method, which is responsible for resolving tokens for proxied requests. When multiple requests for the same audience were made, the cached `Fetcher` instance's `getAccessToken` method could be overridden by a subsequent request, leading to token resolution issues where a token from a different session might be used.
      GHSA-6vgr-cp5c-ffx3 MODERATE 0.0 UNSANITIZED_INPUT→SQL Go
      Package
      github.com/openbao/openbao · openbao/openbao
      Root cause
      The vulnerability existed because the 'schema' variable, which could contain user-controlled input, was directly interpolated into a SQL query string without proper escaping or quoting. This allowed an attacker to inject arbitrary SQL commands into the `REVOKE ALL PRIVILEGES` statement.
      GHSA-7ccv-rp6m-rffr LOW 0.0 MISSING_VERIFICATION→SIGNATURE Go
      Package
      github.com/openbao/openbao · openbao/openbao
      Root cause
      The vulnerability existed because OpenBao's certificate authentication renewal process only checked the Subject Key ID (SKID) and Authority Key ID (AKID) of the client certificate for identity verification during token renewal. It did not store or verify the full raw certificate, allowing an attacker to renew a token using a different certificate as long as it shared the same SKID and AKID as the original, valid certificate.
      GHSA-g5pq-48mj-jvw8 HIGH 0.0 SSRF→INTERNAL_ACCESS Python
      Package
      glances · nicolargo/glances
      Root cause
      The Glances IP plugin allowed an attacker to configure an arbitrary URL for fetching public IP information via the `public_api` setting. The application would then make a request to this user-controlled URL without proper validation of the scheme or host, leading to Server-Side Request Forgery (SSRF).
      GHSA-gfc2-9qmw-w7vh HIGH 0.0 CORS_MISCONFIGURATION→ORIGIN Python
      Package
      Glances · nicolargo/glances
      Root cause
      The Glances REST API, when run without authentication and with the default permissive CORS policy (Access-Control-Allow-Origin: *), allowed any web page to make cross-origin requests and read sensitive system metrics. This misconfiguration exposed the API to unauthorized access from arbitrary origins.
      GHSA-x234-x5vq-cc2v HIGH 0.0 MISSING_AUTH→ENDPOINT Go
      Package
      github.com/0xJacky/Nginx-UI · 0xJacky/nginx-ui
      Root cause
      The application did not invalidate existing authentication tokens when a user's status was changed to disabled or when their password was updated. This allowed previously issued bearer tokens to remain valid, granting full API access to disabled users or users whose passwords had been reset.
      GHSA-mph4-q2vm-w2pw MODERATE 6.5 UNSANITIZED_INPUT→COMMAND Go
      Package
      github.com/kubernetes-sigs/aws-efs-csi-driver · kubernetes-sigs/aws-efs-csi-driver
      Root cause
      The volumeHandle and mounttargetip fields were not properly sanitized before being used in the mount options.
      GHSA-h39g-6x3c-7fq9 LOW 3.8 PATH_TRAVERSAL→FILE_READ C#
      Package
      Zio · xoofx/zio
      Root cause
      The code did not properly sanitize or validate the input path, allowing attackers to traverse directories and access files outside of the intended subfilesystem root.
      GHSA-6g38-8j4p-j3pr CRITICAL 0.0 IDOR→DATA_ACCESS Go
      Package
      github.com/nhost/nhost · nhost/nhost
      Root cause
      The code did not properly verify the email verification status of the user profile.
      GHSA-9qhq-v63v-fv3j CRITICAL 9.8 UNSANITIZED_INPUT→COMMAND Python
      Package
      praisonai · MervinPraison/PraisonAI
      Root cause
      The code did not validate the executable part of the command input.
      GHSA-c97m-vxhj-p7j6 MODERATE 6.1 UNSANITIZED_INPUT→XSS Go
      Package
      github.com/yuin/goldmark/renderer/html · yuin/goldmark
      Root cause
      The code did not properly escape URLs before rendering them in HTML.
      GHSA-2767-2q9v-9326 MODERATE 0.0 SSRF→INTERNAL_ACCESS JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not validate or sanitize the URL before making a request, allowing an attacker to trigger SSRF.
      GHSA-2cq5-mf3v-mx44 HIGH 0.0 UNCLASSIFIED JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The patch introduces a new set of mutable script runners without proper validation or approval mechanisms.
      GHSA-2gvc-4f3c-2855 HIGH 0.0 MISSING_AUTHZ→RESOURCE JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly check if the sender is allowed to access the resource based on the room configuration and store entries.
      GHSA-49cg-279w-m73x MODERATE 0.0 MISSING_AUTHZ→RESOURCE JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      Empty approver lists could grant explicit approval authorization without proper validation.
      GHSA-525j-hqq2-66r4 HIGH 0.0 SSRF→INTERNAL_ACCESS JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly sanitize the Docker network gateway IP address when deriving the effective CDP source range, allowing an attacker to potentially exploit this by sending malicious requests through the exposed DevTools protocol.
      GHSA-527m-976r-jf79 MODERATE 0.0 SSRF→INTERNAL_ACCESS JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The existing-session browser interaction routes did not properly enforce SSRF policy enforcement.
      GHSA-536q-mj95-h29h MODERATE 0.0 SSRF→INTERNAL_ACCESS JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code missed complete navigation guard coverage for SSRF vulnerabilities.
      GHSA-5gjc-grvm-m88j MODERATE 0.0 MISSING_AUTHZ→RESOURCE JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The operator.write commands were not properly restricted to require the 'operator.admin' scope.
      GHSA-66r7-m7xm-v49h HIGH 0.0 PATH_TRAVERSAL→FILE_READ JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code directly uses user input to construct file paths without proper sanitization or validation, allowing attackers to read arbitrary local files.
      GHSA-7g8c-cfr3-vqqr MODERATE 0.0 UNSANITIZED_INPUT→XSS JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not sanitize the `name` field from external input before using it in system events.
      GHSA-7wv4-cc7p-jhxc MODERATE 0.0 OPEN_REDIRECT→PHISHING JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly sanitize environment variables that could be used for endpoint redirection.
      GHSA-82qx-6vj7-p8m2 HIGH 0.0 UNCLASSIFIED JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code does not appear to contain any direct security vulnerabilities based on the provided diff.
      GHSA-8372-7vhw-cm6q HIGH 0.0 UNCLASSIFIED JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code was not properly redacting sensitive data from the config snapshot, allowing potentially unredacted data to be exposed.
      GHSA-92jp-89mq-4374 MODERATE 0.0 MISSING_AUTH→ENDPOINT JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The original code did not check if the browser authentication was verified before exposing the interactive browser session credentials.
      GHSA-939r-rj45-g2rj HIGH 0.0 UNCLASSIFIED JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly validate or sanitize input related to plugin provider choices, allowing untrusted providers to be auto-enabled.
      GHSA-c3fc-8qff-9hwx MODERATE 0.0 UNSANITIZED_INPUT→LDAP Java
      Package
      org.bouncycastle:bcprov-jdk18on · bcgit/bc-java
      Root cause
      The code directly uses user input in LDAP queries without proper sanitization or parameterized queries.
      GHSA-c4qm-58hj-j6pj MODERATE 0.0 SSRF→INTERNAL_ACCESS JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not validate the URL before navigating to it, allowing an attacker to perform SSRF attacks.
      GHSA-c9h3-5p7r-mrjh MODERATE 0.0 UNCLASSIFIED JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The vulnerability existed because the code did not properly sanitize input related to media parameters.
      GHSA-cj8j-37rh-8475 HIGH 0.0 WEAK_CRYPTO→RANDOM Java
      Package
      org.bouncycastle:bcpg-jdk18on · bcgit/bc-java
      Root cause
      The code lacked proper random number generation for nonce creation, potentially leading to predictable values.
      GHSA-f7fh-qg34-x2xh MODERATE 0.0 SSRF→INTERNAL_ACCESS JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not validate the target URL before establishing a WebSocket connection.
      GHSA-f934-5rqf-xx47 MODERATE 0.0 PATH_TRAVERSAL→FILE_READ JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly sanitize the input path, allowing attackers to read arbitrary files on the server.
      GHSA-g2hm-779g-vm32 MODERATE 0.0 PRIVILEGE_ESCALATION→ROLE JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The system incorrectly assumed that 'wake-triggered' events, especially those from untrusted webhooks, would not lead to a full heartbeat run if no tasks were due. This allowed untrusted events to bypass the 'senderIsOwner' check, which is crucial for restricting actions to authorized users, leading to a potential privilege escalation.
      GHSA-g375-h3v6-4873 MODERATE 0.0 UNSANITIZED_INPUT→COMMAND JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The original regex did not properly sanitize input, allowing for potential command injection.
      GHSA-gc9r-867r-j85f LOW 0.0 MISSING_AUTHZ→RESOURCE JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The function `isFeedbackInvokeAuthorized` did not check the sender's authorization before processing an invoke request.
      GHSA-j6c7-3h5x-99g9 MODERATE 0.0 UNCLASSIFIED JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly detect and handle shell-wrapper detection, allowing for potential injection of environment assignment keys.
      GHSA-jf25-7968-h2h5 MODERATE 0.0 PATH_TRAVERSAL→FILE_WRITE JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly sanitize or validate the `outPath` parameter when writing files to a workspace-only filesystem.
      GHSA-jhpv-5j76-m56h MODERATE 0.0 PATH_TRAVERSAL→FILE_READ JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The original code did not properly sanitize or validate the input path for file reads, allowing attackers to access local files through a crafted input.
      GHSA-jwrq-8g5x-5fhm MODERATE 0.0 MISSING_AUTHZ→RESOURCE JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly handle authorization for queue batches, potentially allowing unauthorized access to resources.
      GHSA-mr34-9552-qr95 HIGH 0.0 UNCLASSIFIED JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The patch does not introduce any new security vulnerabilities based on the provided diff.
      GHSA-qmwg-qprg-3j38 MODERATE 0.0 SSRF→INTERNAL_ACCESS JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly validate or sanitize the URL before navigating to it, allowing an attacker to pivot into local CDP and regain file reads.
      GHSA-r77c-2cmr-7p47 LOW 0.0 UNCLASSIFIED JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The patch adds a new field 'session' to the delivery payload but does not address how this session context is handled or sanitized.
      GHSA-rj2p-j66c-mgqh MODERATE 0.0 SSRF→INTERNAL_ACCESS JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly handle SSRF policy failures against the CDP endpoint.
      GHSA-vw3h-q6xq-jjm5 HIGH 0.0 BUFFER_OVERFLOW→HEAP JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The WebSocket server did not limit the size of incoming messages, allowing attackers to send oversized frames that could potentially lead to a heap buffer overflow.
      GHSA-xh72-v6v9-mwhc CRITICAL 0.0 MISSING_AUTH→ENDPOINT JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not validate the presence of an encryptKey before processing requests.
      GHSA-xmxx-7p24-h892 HIGH 0.0 MISSING_AUTH→ENDPOINT JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code does not re-resolve bearer auth after SecretRef rotation, allowing attackers to use outdated authentication tokens.
      GHSA-xq94-r468-qwgj MODERATE 0.0 SSRF→INTERNAL_ACCESS JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly validate the hostname of the CDP endpoint, allowing DNS rebinding attacks.
      GHSA-2689-5p89-6j3j CRITICAL 9.8 BUFFER_OVERFLOW→STACK Python
      Package
      uefi-firmware · theopolis/uefi-firmware-parser
      Root cause
      The `MakeTable` function, responsible for creating Huffman code mapping tables, did not adequately validate the `BitLen` array values. Specifically, it failed to check if `BitLen[Index]` exceeded 16 or if `Start[Len]` (calculated from `BitLen`) could lead to an out-of-bounds write when indexing the `Table` array, which is allocated on the stack.
      GHSA-gvvw-8j96-8g5r CRITICAL 9.8 UNCLASSIFIED C#
      Package
      Microsoft.Native.Quic.MsQuic.OpenSSL · microsoft/msquic
      Root cause
      The code did not properly validate the count value before using it, allowing an attacker to potentially elevate privileges.
      GHSA-hm2w-vr2p-hq7w CRITICAL 9.8 BUFFER_OVERFLOW→HEAP Python
      Package
      uefi-firmware · theopolis/uefi-firmware-parser
      Root cause
      The vulnerability existed in the `MakeTable` function within the Tiano decompressor. Specifically, the `Table` array, which is used to store Huffman code mappings, could be written to beyond its allocated bounds if the calculated `Index` or `NextCode` values exceeded the expected `TableSize` (or `MaxTableLength`). This was due to insufficient bounds checking on the `Index` variable before writing to `Table[Index]`, particularly when `Len` was less than or equal to `TableBits`.
      GHSA-29qv-4j9f-fjw5 HIGH 8.8 UNCLASSIFIED JavaScript
      Package
      mathjs · josdejong/mathjs
      Root cause
      The patch changes the function `isSafeProperty` to `isSafeObjectProperty`, which may not cover all cases as intended.
      GHSA-855c-r2vq-c292 HIGH 8.7 UNSANITIZED_INPUT→XSS JavaScript
      Package
      apostrophe · apostrophecms/apostrophe
      Root cause
      Untrusted data in SEO fields was being embedded directly into a `<script>` tag without proper sanitization.
      GHSA-hv99-mxm5-q397 HIGH 7.7 PATH_TRAVERSAL→FILE_READ Python
      Package
      weblate · WeblateOrg/weblate
      Root cause
      The code did not properly sanitize input when constructing file paths, allowing attackers to read arbitrary files via symlinks.
      GHSA-27h3-crw2-q36w HIGH 7.5 INFO_DISCLOSURE→ERROR_MESSAGE Java
      Package
      org.apache.skywalking:server-core · apache/skywalking
      Root cause
      The /debugging/config/dump endpoint did not properly sanitize configuration information before returning it to the client.
      GHSA-9mrh-v2v3-xpfm MODERATE 6.1 UNSANITIZED_INPUT→XSS JavaScript
      Package
      sanitize-html · apostrophecms/apostrophe
      Root cause
      The code did not properly sanitize HTML entities within certain non-text tags like <textarea> and <xmp>, allowing attackers to bypass intended sanitization.
      GHSA-97v6-998m-fp4g MODERATE 5.4 UNSANITIZED_INPUT→XSS JavaScript
      Package
      apostrophe · apostrophecms/apostrophe
      Root cause
      The code did not properly sanitize the input for CSS custom property injection.
      GHSA-9gcg-w975-3rjh MODERATE 5.4 UNSANITIZED_INPUT→REGEX Go
      Package
      istio.io/istio · istio/istio
      Root cause
      The regex pattern did not escape dots, allowing attackers to inject malicious patterns.
      GHSA-c276-fj82-f2pq MODERATE 5.3 INFO_DISCLOSURE→ERROR_MESSAGE JavaScript
      Package
      apostrophe · apostrophecms/apostrophe
      Root cause
      The code did not properly restrict which fields could be exposed through the `choices` and `counts` query parameters based on the `publicApiProjection`. This allowed unauthorized exposure of sensitive data.
      GHSA-xhq9-58fw-859p MODERATE 5.3 IDOR→DATA_ACCESS JavaScript
      Package
      apostrophe · apostrophecms/apostrophe
      Root cause
      The code did not properly validate or sanitize the 'project' query builder parameter, allowing an attacker to bypass intended data access controls.
      GHSA-5fhx-9jwj-867m MODERATE 5.0 SSRF→INTERNAL_ACCESS Python
      Package
      weblate · WeblateOrg/weblate
      Root cause
      The code did not validate the redirect targets before following them, allowing an attacker to bypass the ALLOWED_ASSET_DOMAINS restriction.
      GHSA-ffgh-3jrf-8wvh MODERATE 5.0 PATH_TRAVERSAL→FILE_READ Python
      Package
      weblate · WeblateOrg/weblate
      Root cause
      The code did not properly sanitize or validate the input path, allowing attackers to bypass repository boundary checks through symlink/junction path prefix collisions.
      GHSA-xrwr-fcw6-fmq8 MODERATE 5.0 SSRF→INTERNAL_ACCESS Python
      Package
      weblate · WeblateOrg/weblate
      Root cause
      The code did not validate the URL before making an HTTP request, allowing attackers to perform SSRF attacks.
      GHSA-hfrg-mcvw-8mch MODERATE 4.9 UNCLASSIFIED Java
      Package
      com.ritense.valtimo:inbox · valtimo-platform/valtimo
      Root cause
      The code did not handle the case where `resultId` is null when creating a `DocumentUpdatedSseEvent`, potentially exposing error messages to attackers.
      GHSA-mj7r-x3h3-7rmr LOW 3.7 TIMING_SIDE_CHANNEL→USER_ENUM JavaScript
      Package
      apostrophe · apostrophecms/apostrophe
      Root cause
      The original code did not introduce any delay when a user does not exist or the user's email is missing, allowing attackers to infer information about users through timing differences.
      GHSA-vj45-x3pj-f4w4 LOW 3.1 MISSING_AUTHZ→RESOURCE Python
      Package
      weblate · WeblateOrg/weblate
      Root cause
      The code did not properly check access control for pending tasks in the API.
      GHSA-353c-v8x9-v7c3 HIGH 0.0 BUFFER_OVERFLOW→HEAP JavaScript
      Package
      mcp-framework · QuantGeekDev/mcp-framework
      Root cause
      The original code did not limit the size of the HTTP request body, allowing attackers to send arbitrarily large requests and exhaust server resources.
      GHSA-3g92-f9ch-qjcm LOW 0.0 WEAK_CRYPTO→HASH RUST
      Package
      p3-symmetric · Plonky3/Plonky3
      Root cause
      The sponge construction used to get a hash function from a cryptographic permutation is not collision resistant for inputs of different lengths.
      GHSA-gj9q-8w99-mp8j LOW 0.0 RACE_CONDITION→TOCTOU JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly handle file access checks between the existence check and the actual read operation.
      GHSA-xr6f-h4x7-r6qp HIGH 0.0 UNSANITIZED_INPUT→COMMAND PHP
      Package
      wwbn/avideo · WWBN/AVideo
      Root cause
      The `cloneSiteURL` parameter was not properly sanitized before being used in a command execution context.
      GHSA-cw73-5f7h-m4gv CRITICAL 9.8 UNCLASSIFIED Python
      Package
      upsonic · Upsonic/Upsonic
      Root cause
      The code snippet provided does not contain any obvious security vulnerabilities.
      GHSA-247c-9743-5963 HIGH 7.5 UNSANITIZED_INPUT→HEADER JavaScript
      Package
      fastify · fastify/fastify
      Root cause
      The vulnerability existed because the `getEssenceMediaType` function, responsible for extracting the media type from the 'Content-Type' header, only split the header string by the semicolon character. This allowed an attacker to prepend a space before the semicolon (e.g., ' application/json;charset=utf-8') to bypass the schema validation logic, as the leading space was not considered a delimiter.
      GHSA-gj7p-595x-qwf5 MODERATE 0.0 SESSION_FIXATION→HIJACK Java
      Package
      dev.dsf:dsf-bpe-server · datasharingframework/dsf
      Root cause
      The code does not set a session timeout for OIDC sessions, allowing attackers to hijack existing sessions.
      GHSA-wg6q-6289-32hp MODERATE 0.0 MISSING_VERIFICATION→SIGNATURE Java
      Package
      org.bouncycastle:bcpkix-debug-jdk14 · bcgit/bc-java
      Root cause
      The code did not check if any signatures were actually verified before returning the result.
      GHSA-xmj9-7625-f634 MODERATE 0.0 TIMING_SIDE_CHANNEL→TOKEN_LEAK Java
      Package
      dev.dsf:dsf-bpe-server · datasharingframework/dsf
      Root cause
      The code does not properly handle the timing of OIDC provider discovery and JWKS resource requests, which could allow an attacker to perform a timing side-channel attack.
      GHSA-xp4f-g2cm-rhg7 MODERATE 0.0 UNCLASSIFIED PHP
      Package
      pocketmine/pocketmine-mp · pmmp/PocketMine-MP
      Root cause
      The code was logging potentially sensitive data without proper sanitization or truncation.
      GHSA-gph2-j4c9-vhhr CRITICAL 10.0 UNSANITIZED_INPUT→XSS PHP
      Package
      wwbn/avideo · WWBN/AVideo
      Root cause
      The application's WebSocket broadcast relay allowed unauthenticated users to inject arbitrary JavaScript code into messages. Specifically, the 'autoEvalCodeOnHTML' field and the 'callback' field in WebSocket messages were not properly sanitized or validated before being relayed to other clients, which would then execute the injected code via client-side eval() sinks.
      GHSA-j98m-w3xp-9f56 CRITICAL 9.4 PATH_TRAVERSAL→FILE_READ Python
      Package
      excel-mcp-server · haris-musa/excel-mcp-server
      Root cause
      The code did not properly sanitize the input filename, allowing attackers to traverse directories and access files outside of the intended directory.
      GHSA-66hx-chf7-3332 HIGH 8.8 PRIVILEGE_ESCALATION→ROLE Python
      Package
      pyload-ng · pyload/pyload
      Root cause
      The application did not invalidate user sessions when a user's password, role, or permissions were changed. This allowed users to retain their old privileges until their session naturally expired or they manually logged out, even after an administrator had downgraded their access.
      GHSA-vvfw-4m39-fjqf HIGH 8.3 CSRF→STATE_CHANGE PHP
      Package
      wwbn/avideo · WWBN/AVideo
      Root cause
      The application's configuration update endpoint (configurationUpdate.json.php) lacked proper CSRF protection. This allowed an attacker to craft a malicious request that, when triggered by an authenticated administrator, would modify the site's configuration without the administrator's explicit consent.
      GHSA-ccq9-r5cw-5hwq HIGH 8.1 CORS_MISCONFIGURATION→ORIGIN PHP
      Package
      wwbn/avideo · WWBN/AVideo
      Root cause
      The application's CORS policy, specifically in the `allowOrigin` function when `allowAll` was true, would reflect the `Origin` header from the request and set `Access-Control-Allow-Credentials: true`. This was intended for public resources but was applied to sensitive API endpoints, allowing any origin to make credentialed requests.
      GHSA-77fj-vx54-gvh7 HIGH 7.5 BUFFER_OVERFLOW→HEAP Go
      Package
      github.com/gomarkdown/markdown · gomarkdown/markdown
      Root cause
      The `smartLeftAngle` function in the SmartypantsRenderer processed text to find the closing angle bracket '>'. If no closing bracket was found, the loop would iterate until `i` equaled `len(text)`. Subsequently, `text[:i+1]` would attempt to access an index beyond the buffer's bounds, leading to an out-of-bounds read.
      GHSA-fwvm-ggf6-2p4x HIGH 7.5 XML_EXTERNAL_ENTITY→FILE_READ C#
      Package
      Magick.NET-Q8-x86 · ImageMagick/ImageMagick
      Root cause
      The function `DestroyXMLTree` did not properly handle XML external entities, leading to a potential stack overflow.
      GHSA-w5xj-99cg-rccm HIGH 7.5 MISSING_AUTHZ→RESOURCE Ruby
      Package
      decidim-core · decidim/decidim
      Root cause
      The application logic for handling amendments (accepting, rejecting, reacting, promoting) did not properly check the component's settings. Specifically, the `can_react_to_emendation?` and `allowed_to_promote?` methods in `AmendmentsHelper` lacked checks against the `amendment_reaction_enabled` and `amendment_promotion_enabled` component settings, respectively. This allowed any authenticated user to perform these actions regardless of the component's configuration.
      GHSA-x9h5-r9v2-vcww HIGH 7.5 BUFFER_OVERFLOW→HEAP C#
      Package
      Magick.NET-Q8-x86 · ImageMagick/ImageMagick
      Root cause
      The code did not properly validate the length of the input data before using it to access a buffer.
      GHSA-ff5q-cc22-fgp4 HIGH 7.1 CORS_MISCONFIGURATION→ORIGIN PHP
      Package
      wwbn/avideo · WWBN/AVideo
      Root cause
      The application reflected the `HTTP_ORIGIN` header directly into the `Access-Control-Allow-Origin` header for all API requests, including authenticated ones. This allowed an attacker to bypass the Same-Origin Policy.
      GHSA-ffw8-fwxp-h64w HIGH 7.1 CSRF→STATE_CHANGE PHP
      Package
      wwbn/avideo · WWBN/AVideo
      Root cause
      The application's administrative JSON endpoints lacked proper CSRF protection. This allowed an attacker to craft malicious requests that, when executed by an authenticated administrator, would perform actions without the administrator's explicit consent.
      GHSA-cmxv-58fp-fm3g MODERATE 6.8 CREDENTIAL_LEAK→LOG_EXPOSURE Java
      Package
      org.asynchttpclient:async-http-client · AsyncHttpClient/async-http-client
      Root cause
      The AsyncHttpClient library did not properly strip authorization credentials (like Authorization headers or Realm information) when following HTTP redirects to different base URIs or when downgrading from HTTPS to HTTP. This meant that sensitive authentication data could be inadvertently sent to untrusted or less secure domains.
      GHSA-gpgp-w4x2-h3h7 MODERATE 6.5 IDOR→DATA_ACCESS PHP
      Package
      wwbn/avideo · WWBN/AVideo
      Root cause
      The code did not properly restrict access to the Live Restreams list based on user permissions, allowing non-admin users to view other users' stream keys and OAuth tokens.
      GHSA-m63r-m9jh-3vc6 MODERATE 6.5 PATH_TRAVERSAL→FILE_READ PHP
      Package
      wwbn/avideo · WWBN/AVideo
      Root cause
      The code did not properly sanitize the `downloadURL` parameter, allowing attackers to traverse directories and access files outside of the intended directory.
      GHSA-5592-p365-24xh MODERATE 6.2 BUFFER_OVERFLOW→HEAP C#
      Package
      Magick.NET-Q8-x86 · ImageMagick/ImageMagick
      Root cause
      The code did not properly validate the length of the input before copying it to a fixed-size buffer.
      GHSA-5xg3-585r-9jh5 MODERATE 6.2 BUFFER_OVERFLOW→HEAP C#
      Package
      Magick.NET-Q8-x86 · ImageMagick/ImageMagick
      Root cause
      The code increments the number of images in the current group without checking if the group index is valid.
      GHSA-6qvv-pj99-48qm MODERATE 6.1 OPEN_REDIRECT→PHISHING JavaScript
      Package
      @adonisjs/http-server · adonisjs/http-server
      Root cause
      The application did not properly validate redirect URLs, allowing attackers to redirect users to arbitrary destinations.
      GHSA-f4qm-vj5j-9xpw MODERATE 5.5 BUFFER_OVERFLOW→STACK C#
      Package
      Magick.NET-Q8-x86 · ImageMagick/ImageMagick
      Root cause
      Recursive FX Expression Parsing without proper depth check allowed for excessive recursion leading to stack overflow.
      GHSA-jvgr-9ph5-m8v4 MODERATE 5.5 BUFFER_OVERFLOW→HEAP C#
      Package
      Magick.NET-Q8-x86 · ImageMagick/ImageMagick
      Root cause
      The code did not properly calculate the size of the buffer for storing image channels, leading to a potential heap buffer overflow when encoding JXL images with 16-bit float data.
      GHSA-pcvx-ph33-r5vv MODERATE 5.5 BUFFER_OVERFLOW→HEAP C#
      Package
      Magick.NET-Q8-x86 · ImageMagick/ImageMagick
      Root cause
      The code did not properly validate the bounds of the `x_offset` array, leading to an out-of-bounds read.
      GHSA-pwg5-6jfc-crvh MODERATE 5.5 BUFFER_OVERFLOW→HEAP C#
      Package
      Magick.NET-Q8-x86 · ImageMagick/ImageMagick
      Root cause
      The code did not validate the input values for subsampling_dx and subsampling_dy, allowing an attacker to write out-of-bounds in the heap.
      GHSA-r83h-crwp-3vm7 MODERATE 5.5 USE_AFTER_FREE→MEMORY C#
      Package
      Magick.NET-Q8-x86 · ImageMagick/ImageMagick
      Root cause
      The code attempts to use a pointer after it has been freed.
      GHSA-8pv3-29pp-pf8f MODERATE 5.4 UNSANITIZED_INPUT→XSS PHP
      Package
      wwbn/avideo · WWBN/AVideo
      Root cause
      The duration value was not properly sanitized before being outputted in the HTML.
      GHSA-8qm8-g55h-xmqr MODERATE 5.4 CSRF→STATE_CHANGE PHP
      Package
      wwbn/avideo · WWBN/AVideo
      Root cause
      The commentDelete.json.php endpoint lacked CSRF protection, allowing attackers to perform mass comment deletion without proper authentication.
      GHSA-x2pw-9c38-cp2j MODERATE 5.4 CSRF→STATE_CHANGE PHP
      Package
      wwbn/avideo · WWBN/AVideo
      Root cause
      The endpoints were missing CSRF protection, allowing attackers to perform state-changing actions without proper authentication.
      GHSA-793q-xgj6-7frp MODERATE 5.3 SSRF→INTERNAL_ACCESS PHP
      Package
      wwbn/avideo · WWBN/AVideo
      Root cause
      The original code did not properly validate the redirect URL before performing an SSRF check.
      GHSA-hg7g-56h5-5pqr MODERATE 5.3 SESSION_FIXATION→HIJACK PHP
      Package
      wwbn/avideo · WWBN/AVideo
      Root cause
      The vulnerability existed because the session token was not invalidated on failure, allowing an attacker to hijack a user's session.
      GHSA-3m9m-24vh-39wx MODERATE 0.0 SSRF→INTERNAL_ACCESS PHP
      Package
      craftcms/cms · craftcms/cms
      Root cause
      The application allowed asset uploads via a URL without properly validating the scheme of the provided URL. This enabled an attacker to specify arbitrary schemes like `gopher://`, `file://`, or `ftp://`, which could be used to make requests to internal resources or local files.
      GHSA-3vxg-x5f8-f5qf LOW 0.0 INFO_DISCLOSURE→ERROR_MESSAGE PHP
      Package
      craftcms/commerce · craftcms/commerce
      Root cause
      The application was inadvertently including customer order data (specifically, the cart array) in error responses for unauthenticated payment attempts on completed orders. This allowed an attacker to retrieve sensitive order details without proper authentication.
      GHSA-4x48-cgf9-q33f HIGH 0.0 SSRF→INTERNAL_ACCESS JavaScript
      Package
      @novu/api · novuhq/novu
      Root cause
      The application allowed users to specify webhook URLs in conditions filters. While a `validateUrlSsrf()` function existed, it was not being called for webhook URLs within the conditions filter logic, allowing an attacker to bypass existing SSRF protection and make requests to internal resources.
      GHSA-5879-4fmr-xwf2 MODERATE 0.0 PATH_TRAVERSAL→FILE_DELETE PHP
      Package
      wwbn/avideo · WWBN/AVideo
      Root cause
      The code did not properly sanitize the input for file deletion, allowing attackers to traverse directories and potentially delete arbitrary files on the server.
      GHSA-875v-7m49-8x88 HIGH 0.0 UNSANITIZED_INPUT→SQL PHP
      Package
      craftcms/commerce · craftcms/commerce
      Root cause
      The code did not validate the input for the `type` parameter before using it in a SQL query.
      GHSA-8q5w-mmxf-48jg MODERATE 0.0 UNSANITIZED_INPUT→XSS Go
      Package
      github.com/siyuan-note/siyuan/kernel · siyuan-note/siyuan
      Root cause
      The `luteEngine` was not configured to sanitize input, allowing potential XSS attacks.
      GHSA-95wr-3f2v-v2wh MODERATE 0.0 SSRF→INTERNAL_ACCESS PHP
      Package
      craftcms/cms · craftcms/cms
      Root cause
      The `actionResourceJs` endpoint in `AppController.php` directly fetched a URL provided by the user via a Guzzle client without sufficient validation or sanitization. This allowed an attacker to control the URL that the server would request, leading to a Server-Side Request Forgery.
      GHSA-9c4q-hq6p-c237 HIGH 0.0 UNCLASSIFIED Go
      Package
      github.com/minio/minio · minio/minio
      Root cause
      The patch does not address any security issue related to missing signature verification.
      GHSA-fj52-5g4h-gmq8 LOW 0.0 SESSION_FIXATION→HIJACK Python
      Package
      pyload-ng · pyload/pyload
      Root cause
      The code did not invalidate user sessions after permission changes, allowing attackers to hijack sessions.
      GHSA-hc8w-h2mf-hp59 MODERATE 0.0 UNSANITIZED_INPUT→COMMAND Go
      Package
      github.com/containers/podman/v5 · containers/podman
      Root cause
      The original code directly used user input (`imagePath.GetPath()`) in the PowerShell command without proper sanitization.
      GHSA-hv4r-mvr4-25vw HIGH 0.0 MISSING_AUTH→ENDPOINT Go
      Package
      github.com/minio/minio · minio/minio
      Root cause
      The vulnerability stemmed from a bypass in the query-string credential signature validation for unsigned-trailer uploads. MinIO failed to properly authenticate requests when specific conditions related to unsigned trailers were met, allowing an attacker to write objects without valid credentials.
      GHSA-jq2f-59pj-p3m3 MODERATE 0.0 MISSING_AUTHZ→RESOURCE PHP
      Package
      craftcms/cms · craftcms/cms
      Root cause
      The application was missing an authorization check in the `actionSavePermissions` and `_saveUserGroups` methods. This allowed users who did not have the necessary permissions to modify user groups or permissions to still trigger these actions.
      GHSA-m7r8-6q9j-m2hc MODERATE 0.0 UNSANITIZED_INPUT→XSS PHP
      Package
      wwbn/avideo · WWBN/AVideo
      Root cause
      The original code did not properly sanitize the 'href' attribute of inline links, allowing attackers to inject malicious scripts.
      GHSA-mrqg-xmgm-rc5g MODERATE 0.0 UNCLASSIFIED Java
      Package
      org.xwiki.platform:xwiki-platform-legacy-oldcore · xwiki/xwiki-platform
      Root cause
      The code did not properly limit the number of items returned by a query, potentially leading to directory listing.
      GHSA-pm7q-rjjx-979p HIGH 0.0 CREDENTIAL_LEAK→LOG_EXPOSURE Go
      Package
      github.com/oxia-db/oxia · oxia-db/oxia
      Root cause
      The application was logging the full bearer token in debug messages when an authentication failure occurred. This meant that if debug logging was enabled, the sensitive authentication token could be exposed in logs, making it accessible to anyone with access to the log files.
      GHSA-pq8p-wc4f-vg7j HIGH 0.0 MISSING_AUTH→ENDPOINT PHP
      Package
      wwbn/avideo · WWBN/AVideo
      Root cause
      The application previously had a command injection vulnerability (CVE-2026-33502) in the `wget` function, which was used to fetch content from a URL provided by user input. The original fix was incomplete, as it did not restrict access to the `test.php` endpoint, allowing unauthenticated attackers to still trigger the vulnerable `wget` function.
      GHSA-r4q5-vmmm-2653 MODERATE 0.0 OPEN_REDIRECT→PHISHING JavaScript
      Package
      follow-redirects · follow-redirects/follow-redirects
      Root cause
      The code did not properly sanitize HTTP headers before redirecting to a cross-domain target.
      GHSA-3p24-9x7v-7789 HIGH 8.8 UNSANITIZED_INPUT→COMMAND Java
      Package
      gov.nsa.emissary:emissary · NationalSecurityAgency/emissary
      Root cause
      The application allowed user-controlled input for IN_FILE_ENDING and OUT_FILE_ENDING configuration parameters to be used directly in shell commands without proper sanitization. This enabled attackers to inject arbitrary shell commands by crafting malicious file ending values.
      GHSA-4f3f-g24h-fr8m HIGH 8.8 DESERIALIZATION→RCE Python
      Package
      keras · keras-team/keras
      Root cause
      The code did not properly sanitize input during deserialization, allowing an attacker to execute arbitrary code.
      GHSA-9pr4-rf97-79qh HIGH 8.7 UNSANITIZED_INPUT→XSS Go
      Package
      github.com/enchant97/note-mark/backend · enchant97/note-mark
      Root cause
      The application allowed unrestricted upload of assets and served them with their original Content-Type, including 'text/html' and 'image/svg+xml'. This enabled an attacker to upload malicious HTML or SVG files containing JavaScript, which would then execute in the victim's browser when the asset was viewed.
      GHSA-5835-4gvc-32pc HIGH 8.2 UNSANITIZED_INPUT→LDAP Go
      Package
      github.com/foxcpp/maddy · foxcpp/maddy
      Root cause
      The username was not properly sanitized before being used in an LDAP search filter.
      GHSA-jcxm-m3jx-f287 HIGH 8.1 UNSANITIZED_INPUT→COMMAND JavaScript
      Package
      simple-git · steveukx/git-js
      Root cause
      The code did not properly sanitize input for the 'clone' operation, allowing attackers to bypass intended restrictions.
      GHSA-p5w6-75f9-cc2p MODERATE 5.9 IDOR→DATA_ACCESS Go
      Package
      github.com/enchant97/note-mark/backend · enchant97/note-mark
      Root cause
      The application allowed any authenticated user to download any asset by knowing its ID and the associated note ID, without verifying if the user had legitimate access to the note itself. The `GetNoteAssetContentByID` function lacked proper authorization checks.
      GHSA-v67w-737x-v2c9 MODERATE 5.9 INTEGER_OVERFLOW→BOUNDARY C#
      Package
      Magick.NET-Q8-x86 · ImageMagick/ImageMagick
      Root cause
      The vulnerability was caused by an integer overflow/wraparound in the viff encoder on 32-bit builds. When calculating the size of memory to allocate (variable 'packets'), a large value could wrap around, resulting in a smaller-than-expected allocation. Subsequent operations would then write beyond the allocated buffer, leading to a heap overflow.
      GHSA-48m6-486p-9j8p MODERATE 5.3 NULL_DEREF→CRASH RUST
      Package
      nimiq-consensus · nimiq/core-rs-albatross
      Root cause
      The vulnerability existed because the `RequestMacroChain` handler did not validate that a provided block locator hash referred to a macro block before attempting to retrieve a chain of macro blocks. If a micro block hash was provided, the subsequent call to `get_macro_blocks()` would panic, leading to a denial of service.
      GHSA-cr67-pvmx-2pp2 MODERATE 5.3 BUFFER_OVERFLOW→HEAP C#
      Package
      Magick.NET-Q8-x86 · ImageMagick/ImageMagick
      Root cause
      The vulnerability existed because the code attempted to access an array element at 'length-1' without properly checking if 'length' could be zero or one. If 'length' was 0 or 1, 'length-1' would result in an out-of-bounds negative index or index 0, leading to a heap-buffer-overflow write of a single zero byte.
      GHSA-26qp-ffjh-2x4v MODERATE 5.1 INTEGER_OVERFLOW→BOUNDARY C#
      Package
      Magick.NET-Q8-x86 · ImageMagick/ImageMagick
      Root cause
      The vulnerability existed because the calculation for memory allocation (length = (image->columns+2)*(image->rows+2)) did not properly check for potential integer overflows before performing the multiplication. On 32-bit systems, large image dimensions could cause this multiplication to wrap around, resulting in a smaller-than-expected 'length' value.
      GHSA-w6m9-39cv-2fwp LOW 3.7 TIMING_SIDE_CHANNEL→USER_ENUM Go
      Package
      github.com/enchant97/note-mark/backend · enchant97/note-mark
      Root cause
      The application's login endpoint exhibited a timing difference when a username did not exist versus when it did. If a username was not found in the database, the password comparison logic was skipped, leading to a faster response time compared to when a username existed, even with an incorrect password.
      GHSA-r2pg-r6h7-crf3 HIGH 0.0 SSRF→INTERNAL_ACCESS Go
      Package
      github.com/external-secrets/external-secrets · external-secrets/external-secrets
      Root cause
      The External Secrets Operator's v2 template engine included the `getHostByName` function from the Sprig library. This function allowed templates to perform DNS lookups, which could be abused to exfiltrate sensitive information (secrets) by encoding them into DNS queries to an attacker-controlled domain.
      GHSA-vffh-x6r8-xx99 MODERATE 0.0 UNSANITIZED_INPUT→XSS Go
      Package
      github.com/prometheus/prometheus · prometheus/prometheus
      Root cause
      The Prometheus web UI rendered metric names and label values directly into HTML tooltips and the metrics explorer without proper HTML escaping. This allowed an attacker to inject arbitrary HTML and script code by crafting malicious metric names or label values.
      GHSA-whj4-6x5x-4v2j HIGH 0.0 DOS→RESOURCE_EXHAUSTION Python
      Package
      pillow · python-pillow/Pillow
      Root cause
      The application used `gzip.decompress` on the entire input stream without any size limits. An attacker could craft a compressed FITS file that, when decompressed, expands to an extremely large size, consuming excessive memory and CPU resources.
      GHSA-9cp7-j3f8-p5jx CRITICAL 10.0 PATH_TRAVERSAL→FILE_WRITE Go
      Package
      github.com/daptin/daptin · daptin/daptin
      Root cause
      The application allowed user-supplied filenames and archive entry names to be used directly in file system operations (e.g., `filepath.Join`, `os.OpenFile`, `os.MkdirAll`) without sufficient sanitization. This enabled attackers to manipulate file paths using `../` sequences or absolute paths.
      GHSA-fvcv-3m26-pcqx CRITICAL 10.0 UNSANITIZED_INPUT→HEADER JavaScript
      Package
      axios · axios/axios
      Root cause
      The Axios library did not properly sanitize header values, allowing newline characters (CRLF) to be injected. This meant that an attacker could append arbitrary headers or even inject a new HTTP request body by including these characters in a user-controlled header value.
      GHSA-8wrq-fv5f-pfp2 CRITICAL 9.6 UNSANITIZED_INPUT→XSS Python
      Package
      lollms · parisneo/lollms
      Root cause
      The application did not properly sanitize user-supplied content before storing it in the database and later rendering it. This allowed attackers to inject malicious scripts into posts, comments, and direct messages.
      GHSA-m5gr-86j6-99jp CRITICAL 9.1 PATH_TRAVERSAL→FILE_WRITE Python
      Package
      gramps-webapi · gramps-project/gramps-web-api
      Root cause
      The application extracted files from a user-provided zip archive without validating the paths of the entries within the archive. This allowed an attacker to craft a zip file containing entries with malicious paths (e.g., `../../../../etc/passwd`) that, when extracted, would write files outside the intended temporary directory.
      GHSA-jvff-x2qm-6286 HIGH 8.8 UNCLASSIFIED JavaScript
      Package
      mathjs · josdejong/mathjs
      Root cause
      The code did not validate that the index parameter was an array, allowing attackers to manipulate object attributes improperly.
      GHSA-6v7q-wjvx-w8wg HIGH 8.2 UNSANITIZED_INPUT→COMMAND JavaScript
      Package
      basic-ftp · patrickjuchli/basic-ftp
      Root cause
      The code did not properly sanitize input for FTP commands, allowing control characters to be injected.
      GHSA-75hx-xj24-mqrw HIGH 8.2 MISSING_AUTH→ENDPOINT JavaScript
      Package
      n8n-mcp · czlonkowski/n8n-mcp
      Root cause
      The code did not handle authentication errors securely, potentially revealing sensitive information in error messages.
      GHSA-2943-crp8-38xx HIGH 7.7 PATH_TRAVERSAL→FILE_WRITE Go
      Package
      github.com/patrickhener/goshs · patrickhener/goshs
      Root cause
      The code directly used the target path from the SFTP request without sanitization, allowing attackers to write files in arbitrary locations on the server.
      GHSA-hwqh-2684-54fc HIGH 7.5 UNCLASSIFIED Java
      Package
      org.springframework.cloud:spring-cloud-gateway · spring-cloud/spring-cloud-gateway
      Root cause
      The original code did not properly validate the length of the SSL bundle string before checking if it exists in the bundles list.
      GHSA-8j7f-g9gv-7jhc MODERATE 7.4 SSRF→INTERNAL_ACCESS JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not validate the target URL before making requests, allowing attackers to perform SSRF attacks.
      GHSA-8jvc-mcx6-r4cg HIGH 7.4 UNCLASSIFIED Go
      Package
      code.vikunja.io/api · go-vikunja/vikunja
      Root cause
      The OIDC login path did not enforce TOTP Two-Factor Authentication for all users, allowing bypass of the authentication mechanism.
      GHSA-p6j4-wvmc-vx2h MODERATE 7.3 MISSING_AUTHZ→RESOURCE JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code does not properly check if the user has authorization to access or modify certain resources before performing operations on them.
      GHSA-99j8-wv67-4c72 MODERATE 6.8 UNCLASSIFIED Go
      Package
      github.com/aiven/aiven-operator · aiven/aiven-operator
      Root cause
      The code did not validate the namespace of the secret source, allowing cross-namespace secret exfiltration.
      GHSA-2j53-2c28-g9v2 MODERATE 6.5 UNCLASSIFIED JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code does not enforce sender policy checks before allowing expensive cryptographic operations.
      GHSA-r4fg-73rc-hhh7 MODERATE 6.5 INTEGER_OVERFLOW→BOUNDARY Go
      Package
      code.vikunja.io/api · go-vikunja/vikunja
      Root cause
      The code did not validate the `repeat_after` field for task repetition, allowing attackers to set extremely large values that could cause resource exhaustion.
      GHSA-52vj-fvrv-7q82 LOW 5.6 SSRF→INTERNAL_ACCESS JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly validate or sanitize the hostname before making an HTTP request, allowing attackers to perform SSRF attacks.
      GHSA-fw9q-39r9-c252 MODERATE 5.6 PROTOTYPE_POLLUTION→OVERRIDE JavaScript
      Package
      langsmith · langchain-ai/langsmith-sdk
      Root cause
      Incomplete `__proto__` guard in the internal lodash `set()` function allowed for prototype pollution.
      GHSA-3wqj-33cg-xc48 MODERATE 5.3 PATH_TRAVERSAL→FILE_READ Python
      Package
      rembg · danielgatis/rembg
      Root cause
      The code did not validate the input path for custom model loading, allowing attackers to specify a path outside of the intended directory.
      GHSA-8f9r-gr6r-x63q MODERATE 5.3 MISSING_VERIFICATION→SIGNATURE JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code reads and parses the request body before validating the signature.
      GHSA-vj8v-p5vw-m6v5 MODERATE 5.3 PATH_TRAVERSAL→FILE_READ Python
      Package
      xrootd · xrootd/xrootd
      Root cause
      The code did not properly sanitize input for directory traversal, allowing access to parent directories via trailing '..' patterns.
      GHSA-59xc-5v89-r7pr MODERATE 4.8 UNCLASSIFIED JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code does not properly rate-limit requests based on invalid tokens, allowing brute-force guessing of webhook tokens.
      GHSA-93vf-569f-22cq MODERATE 4.7 UNCLASSIFIED PHP
      Package
      rhukster/dom-sanitizer · rhukster/dom-sanitizer
      Root cause
      The code did not properly sanitize the content of <style> tags, allowing CSS injection via unfiltered url() and @import directives.
      GHSA-48ch-p4gq-x46x MODERATE 4.3 MISSING_AUTHZ→RESOURCE Go
      Package
      code.vikunja.io/api · go-vikunja/vikunja
      Root cause
      The code did not properly validate the project ID associated with each UID, allowing unauthorized access to tasks.
      GHSA-55v6-g8pm-pw4c MODERATE 4.3 SSRF→INTERNAL_ACCESS Python
      Package
      rembg · danielgatis/rembg
      Root cause
      The application did not properly validate or sanitize URLs passed to it, allowing attackers to perform SSRF attacks by providing internal IP addresses or other malicious URLs.
      GHSA-hj5c-mhh2-g7jq MODERATE 4.3 UNSANITIZED_INPUT→SQL Go
      Package
      code.vikunja.io/api · go-vikunja/vikunja
      Root cause
      The previous implementation used chained xorm session .Where/.Or/.And calls which SQL flattened to `A OR B OR C AND D`, leaking any label with any label_tasks row to any authenticated user.
      GHSA-v479-vf79-mg83 MODERATE 4.3 MISSING_AUTHZ→RESOURCE Go
      Package
      code.vikunja.io/api · go-vikunja/vikunja
      Root cause
      The permission check for deleting project backgrounds was not properly enforced.
      GHSA-9qq8-cgcv-qmc9 LOW 3.7 BUFFER_OVERFLOW→HEAP Go
      Package
      github.com/smallstep/certificates · smallstep/certificates
      Root cause
      The code did not check if the `ekus` slice had any elements before accessing its first element.
      GHSA-r854-jrxh-36qx LOW 3.7 TIMING_SIDE_CHANNEL→TOKEN_LEAK PHP
      Package
      phpseclib/phpseclib · phpseclib/phpseclib
      Root cause
      The use of the != operator for HMAC comparison in a variable-time context.
      GHSA-3crg-w4f6-42mx MODERATE 0.0 XML_EXTERNAL_ENTITY→FILE_READ Python
      Package
      pypdf · py-pdf/pypdf
      Root cause
      The code used the default `xml.dom.minidom.parseString` function, which is vulnerable to XXE attacks.
      GHSA-3f6h-2hrp-w5wx MODERATE 0.0 OPEN_REDIRECT→PHISHING JavaScript
      Package
      @sveltejs/kit · sveltejs/kit
      Root cause
      The handle hook in @sveltejs/kit did not validate redirect URLs, allowing attackers to perform open redirects.
      GHSA-8f24-v5vv-gm5j MODERATE 0.0 OPEN_REDIRECT→PHISHING JavaScript
      Package
      next-intl · amannn/next-intl
      Root cause
      The function `sanitizePathname` did not properly sanitize certain characters that could be used to exploit an open redirect vulnerability.
      GHSA-hr2v-4r36-88hr MODERATE 0.0 PATH_TRAVERSAL→FILE_WRITE Go
      Package
      helm.sh/helm/v3 · helm/helm
      Root cause
      The code did not properly sanitize the chart name input, allowing attackers to use dot-segment names that could cause path traversal attacks.
      GHSA-pjjw-68hj-v9mw LOW 0.0 PATH_TRAVERSAL→FILE_DELETE Python
      Package
      uv · astral-sh/uv
      Root cause
      The code directly uses user input to delete files without proper validation or sanitization.
      GHSA-q5jf-9vfq-h4h7 HIGH 0.0 MISSING_VERIFICATION→SIGNATURE Go
      Package
      helm.sh/helm/v4 · helm/helm
      Root cause
      The plugin installation process did not check for the presence of a .prov file, allowing unsigned plugins to be installed without verification.
      GHSA-vmx8-mqv2-9gmg HIGH 0.0 PATH_TRAVERSAL→FILE_WRITE Go
      Package
      helm.sh/helm/v4 · helm/helm
      Root cause
      The code did not validate the plugin version format, allowing an attacker to write files outside the Helm plugin directory.
      GHSA-wvhv-qcqf-f3cx CRITICAL 0.0 MISSING_AUTHZ→RESOURCE Go
      Package
      github.com/patrickhener/goshs · patrickhener/goshs
      Root cause
      The application's file-based Access Control List (ACL) mechanism, which uses '.goshs' files, was not consistently applied across all state-changing operations (delete, mkdir, put, upload). Specifically, the ACL check only looked for a '.goshs' file in the immediate directory, failing to consider ACLs defined in parent directories, and some operations lacked any ACL enforcement.
      GHSA-x7mm-9vvv-64w8 LOW 0.0 UNCLASSIFIED JavaScript
      Package
      unhead · unjs/unhead
      Root cause
      The `streamKey` parameter was being directly injected into an inline script without any validation or sanitization.
      GHSA-hc36-c89j-5f4j HIGH 8.1 MISSING_VERIFICATION→SIGNATURE Ruby
      Package
      bsv-wallet · sgbett/bsv-ruby-sdk
      Root cause
      The code did not verify the certifier signatures before persisting them.
      GHSA-9hfr-gw99-8rhx HIGH 7.5 MISSING_AUTHZ→RESOURCE Ruby
      Package
      bsv-sdk · sgbett/bsv-ruby-sdk
      Root cause
      The code did not properly handle responses indicating that a transaction was not accepted, leading to the treatment of INVALID/MALFORMED/ORPHAN responses as successful broadcasts.
      GHSA-wp29-qmvj-frvp MODERATE 7.3 UNSANITIZED_INPUT→COMMAND Python
      Package
      metagpt · paipeline/MetaGPT
      Root cause
      The `run_command` method directly executes user-provided commands without proper sanitization or validation.
      GHSA-pg8g-f2hf-x82m HIGH 6.5 SSRF→INTERNAL_ACCESS JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The original code did not properly sanitize or validate the request body before sending it across cross-origin redirects.
      GHSA-95h2-gj7x-gx9w MODERATE 6.1 UNSANITIZED_INPUT→XSS JavaScript
      Package
      unhead · unjs/unhead
      Root cause
      The original regex allowed leading-zero padded HTML entities, which could be used to bypass the intended validation.
      GHSA-3j8v-cgw4-2g6q MODERATE 5.3 UNCLASSIFIED JavaScript
      Package
      fast-jwt · nearform/fast-jwt
      Root cause
      The use of stateful regular expressions (/g or /y) in the verifier.js file allows non-deterministic allowed-claim validation, potentially leading to a logical DoS.
      GHSA-95hg-3c55-xf9x LOW 5.3 UNSANITIZED_INPUT→COMMAND JavaScript
      Package
      mcp-server-taskwarrior · awwaiid/mcp-server-taskwarrior
      Root cause
      The use of `execSync` with user-provided input without proper sanitization or validation allowed attackers to inject malicious commands.
      GHSA-cjw9-ghj4-fwxf MODERATE 4.2 UNSANITIZED_INPUT→REGEX JavaScript
      Package
      fast-jwt · nearform/fast-jwt
      Root cause
      The use of RegExp in allowed* options without proper validation can lead to ReDoS attacks.
      GHSA-3p68-rc4w-qgx5 CRITICAL 0.0 SSRF→INTERNAL_ACCESS JavaScript
      Package
      axios · axios/axios
      Root cause
      The code does not properly validate or sanitize the hostname in the `no_proxy` environment variable, allowing attackers to bypass proxy settings and potentially access internal services.
      GHSA-7437-7hg8-frrw HIGH 0.0 UNSANITIZED_INPUT→COMMAND JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly sanitize or denylist certain environment variables that could be used for command injection.
      GHSA-h749-fxx7-pwpg HIGH 0.0 DOS→RESOURCE_EXHAUSTION Go
      Package
      github.com/minio/minio · minio/minio
      Root cause
      The code does not properly validate or limit the size of the input data for S3 Select CSV parsing, leading to an unbounded memory allocation.
      GHSA-qx8j-g322-qj6m HIGH 0.0 SSRF→INTERNAL_ACCESS JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The original code did not properly sanitize or validate the request body before replaying it across cross-origin redirects.
      GHSA-65w6-pf7x-5g85 CRITICAL 9.4 MISSING_AUTH→ENDPOINT JavaScript
      Package
      @delmaredigital/payload-puck · delmaredigital/payload-puck
      Root cause
      The endpoints were missing proper authorization checks, allowing unauthenticated access to CRUD operations on Puck-registered collections.
      GHSA-5gfj-64gh-mgmw HIGH 8.8 PATH_TRAVERSAL→FILE_READ Python
      Package
      agixt · Josh-XT/AGiXT
      Root cause
      The `safe_join` function did not properly validate the resolved path to ensure it stayed within the agent's WORKING_DIRECTORY.
      GHSA-chqc-8p9q-pq6q HIGH 8.6 UNSANITIZED_INPUT→COMMAND JavaScript
      Package
      basic-ftp · patrickjuchli/basic-ftp
      Root cause
      The code did not sanitize input for control characters, allowing attackers to inject CRLF sequences that could manipulate FTP commands.
      GHSA-4ggg-h7ph-26qr HIGH 8.5 SSRF→INTERNAL_ACCESS JavaScript
      Package
      n8n-mcp · czlonkowski/n8n-mcp
      Root cause
      The code did not properly sanitize the `instance-URL` header, allowing attackers to perform SSRF attacks.
      GHSA-h9mw-h4qc-f5jf MODERATE 6.5 DOS→RESOURCE_EXHAUSTION Go
      Package
      github.com/platform-mesh/kubernetes-graphql-gateway · platform-mesh/kubernetes-graphql-gateway
      Root cause
      The GraphQL endpoint did not validate the complexity or depth of queries, allowing authenticated users to execute arbitrarily complex queries that could exhaust resources.
      GHSA-mmw7-wq3c-wf9p MODERATE 6.5 UNCLASSIFIED PHP
      Package
      wwbn/avideo · WWBN/AVideo
      Root cause
      The code does not check if the IPN request is legitimate before processing it.
      GHSA-3xxc-pwj6-jgrj MODERATE 6.2 MISSING_VERIFICATION→SIGNATURE Python
      Package
      rfc3161-client · trailofbits/rfc3161-client
      Root cause
      The code did not properly validate the certificate issuer and serial number.
      GHSA-w8wv-vfpc-hw2w MODERATE 5.9 PATH_TRAVERSAL→FILE_WRITE Python
      Package
      nicegui · zauberzeug/nicegui
      Root cause
      The code did not properly sanitize the filename uploaded by the user, allowing attackers to use backslashes to traverse directories.
      GHSA-rqp3-gf5h-mrqx MODERATE 5.4 UNSANITIZED_INPUT→XSS PHP
      Package
      wwbn/avideo · WWBN/AVideo
      Root cause
      The program title was being directly inserted into HTML without proper sanitization.
      GHSA-26pp-8wgv-hjvm MODERATE 5.3 UNCLASSIFIED JavaScript
      Package
      hono · honojs/hono
      Root cause
      The code did not validate the cookie name before setting it, allowing for injection of invalid characters.
      GHSA-926x-3r5x-gfhw MODERATE 5.3 UNCLASSIFIED Python
      Package
      langchain-core · langchain-ai/langchain
      Root cause
      Incomplete f-string validation in prompt templates allowed for potentially unsafe variable names and format specifiers.
      GHSA-92pp-h63x-v22m MODERATE 5.3 PATH_TRAVERSAL→FILE_READ JavaScript
      Package
      @hono/node-server · honojs/node-server
      Root cause
      The original code did not properly sanitize input paths, allowing attackers to bypass the intended file access restrictions by using repeated slashes.
      GHSA-rv5g-f82m-qrvv MODERATE 5.3 PROTOTYPE_POLLUTION→OVERRIDE JavaScript
      Package
      liquidjs · harttle/liquidjs
      Root cause
      The `sort_natural` filter was using a simple comparison without proper sanitization or validation, allowing attackers to bypass the intended functionality and potentially disclose prototype property information through sorting side-channel.
      GHSA-wmmm-f939-6g9c MODERATE 5.3 PATH_TRAVERSAL→FILE_READ JavaScript
      Package
      hono · honojs/hono
      Root cause
      The original code did not properly sanitize the input path, allowing attackers to bypass intended file access restrictions by using repeated slashes.
      GHSA-5mwj-v5jw-5c97 MODERATE 5.0 MISSING_AUTH→ENDPOINT JavaScript
      Package
      @lobehub/lobehub · lobehub/lobehub
      Root cause
      The code did not properly authenticate requests using the `X-lobe-chat-auth` header.
      GHSA-vvjj-xcjg-gr5g MODERATE 4.9 UNSANITIZED_INPUT→COMMAND JavaScript
      Package
      nodemailer · nodemailer/nodemailer
      Root cause
      The code did not sanitize the input for the SMTP transport name option, allowing attackers to inject CRLF sequences.
      GHSA-r5rp-j6wh-rvv4 MODERATE 4.8 UNCLASSIFIED JavaScript
      Package
      hono · honojs/hono
      Root cause
      The original code did not properly sanitize cookie names and values, allowing non-breaking space prefixes to bypass validation.
      GHSA-8ffj-4hx4-9pgf MODERATE 4.2 WEAK_CRYPTO→CIPHER Python
      Package
      lightrag-hku · HKUDS/LightRAG
      Root cause
      The code did not validate the JWT algorithm, allowing attackers to use the 'none' algorithm for authentication.
      GHSA-mmg9-6m6j-jqqx LOW 3.7 UNCLASSIFIED JavaScript
      Package
      liquidjs · harttle/liquidjs
      Root cause
      The original code did not properly calculate the memory usage for the output string, leading to a quadratic amplification effect.
      GHSA-2679-6mx9-h9xc CRITICAL 0.0 MISSING_AUTH→ENDPOINT Python
      Package
      marimo · marimo-team/marimo
      Root cause
      The WebSocket endpoint was not properly authenticated before processing requests.
      GHSA-h259-74h5-4rh9 HIGH 0.0 UNCLASSIFIED Java
      Package
      org.xwiki.platform:xwiki-platform-legacy-oldcore · xwiki/xwiki-platform
      Root cause
      The code did not properly sanitize or escape user input when rendering Velocity templates.
      GHSA-hwr4-mq23-wcv5 HIGH 0.0 UNCLASSIFIED Go
      Package
      github.com/dunglas/mercure · dunglas/mercure
      Root cause
      The patch does not address a security vulnerability but rather refactors the configuration structure for Topic Selector Cache.
      GHSA-jpcj-7wfg-mqxv HIGH 0.0 UNSANITIZED_INPUT→COMMAND Python
      Package
      stata-mcp · SepineTam/stata-mcp
      Root cause
      The code did not validate user-supplied Stata do-file content, allowing the execution of shell-escape directives like `!cmd` or `shell cmd`.
      GHSA-jx2w-vp7f-456q MODERATE 0.0 PATH_TRAVERSAL→FILE_READ Java
      Package
      io.quarkiverse.openapi.generator:quarkus-openapi-generator · quarkiverse/quarkus-openapi-generator
      Root cause
      The code did not properly sanitize the ZIP entry names before using them to create file paths, allowing attackers to traverse directories and access unintended files.
      GHSA-r758-8hxw-4845 LOW 0.0 UNSANITIZED_INPUT→XSS Python
      Package
      justhtml · EmilStenstrom/justhtml
      Root cause
      The parser did not properly sanitize HTML input, allowing for Cross-Site Scripting (XSS) attacks.
      GHSA-v273-448j-v4qj MODERATE 0.0 PATH_TRAVERSAL→FILE_READ JavaScript
      Package
      liquidjs · harttle/liquidjs
      Root cause
      The `lookup` function in `Loader` did not properly enforce the configured `root` directory for certain lookup types, allowing arbitrary file reads.
      GHSA-xf4j-xp2r-rqqx MODERATE 0.0 PATH_TRAVERSAL→FILE_WRITE JavaScript
      Package
      hono · honojs/hono
      Root cause
      The code did not sanitize the input for file paths, allowing attackers to specify arbitrary paths.
      GHSA-xpcf-pg52-r92g MODERATE 0.0 UNCLASSIFIED JavaScript
      Package
      hono · honojs/hono
      Root cause
      The code did not correctly handle IPv4-mapped IPv6 addresses, leading to incorrect IP matching.
      GHSA-qxpc-96fq-wwmg HIGH 8.8 PRIVILEGE_ESCALATION→ROLE Java
      Package
      org.apache.cassandra:cassandra-all · apache/cassandra
      Root cause
      The patch fails to properly validate the user's permissions before allowing them to drop an identity, potentially escalating their privileges.
      GHSA-mh2q-q3fh-2475 HIGH 7.5 UNCLASSIFIED Go
      Package
      go.opentelemetry.io/otel/propagation · open-telemetry/opentelemetry-go
      Root cause
      The code did not properly limit the number of members or bytes in the baggage header, leading to excessive allocations and potential denial-of-service amplification.
      GHSA-69w3-r845-3855 MODERATE 6.5 DESERIALIZATION→RCE Python
      Package
      transformers · huggingface/transformers
      Root cause
      The `torch.load` function was used without proper validation or sanitization, allowing for arbitrary code execution.
      GHSA-hfpq-x728-986j MODERATE 6.2 INFO_DISCLOSURE→ERROR_MESSAGE RUST
      Package
      netavark · containers/aardvark-dns
      Root cause
      The code did not handle malformed TCP packets correctly, leading to error messages being logged and potentially exposed to attackers.
      GHSA-h336-2wxm-pr6q MODERATE 5.3 MISSING_AUTHZ→RESOURCE Python
      Package
      OpenViking · volcengine/OpenViking
      Root cause
      The task polling endpoints lacked proper authorization checks to ensure that only authorized users could access tasks.
      GHSA-cpm7-cfpx-3hvp MODERATE 4.8 UNSANITIZED_INPUT→XSS Java
      Package
      gov.nsa.emissary:emissary · NationalSecurityAgency/emissary
      Root cause
      The application did not sanitize user input for navigation links, allowing attackers to inject malicious scripts.
      GHSA-f37v-82c4-4x64 LOW 2.8 NULL_DEREF→CRASH JavaScript
      Package
      electron · electron/electron
      Root cause
      The code did not check if the bitmap was null before creating an image from it.
      GHSA-2cqq-rpvq-g5qj CRITICAL 0.0 DESERIALIZATION→RCE Java
      Package
      org.openidentityplatform.openam:openam · OpenIdentityPlatform/OpenAM
      Root cause
      The code uses `ObjectInputStream` to deserialize data without proper validation or sanitization, allowing an attacker to execute arbitrary code.
      GHSA-2f7j-rp58-mr42 MODERATE 0.0 INFO_DISCLOSURE→DIRECTORY_LISTING JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The function `buildGatewaySnapshot` exposed sensitive configuration and state paths to non-admin clients without proper authorization checks.
      GHSA-2qrv-rc5x-2g2h MODERATE 0.0 UNCLASSIFIED JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly check if the workspace channel shadows should be excluded during built-in channel setup.
      GHSA-3q42-xmxv-9vfr MODERATE 0.0 MISSING_AUTHZ→RESOURCE JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The vulnerability existed because the code did not check if the caller had the required 'operator.admin' scope before allowing them to set admin-class talk voice config persistence.
      GHSA-42mx-vp8m-j7qh MODERATE 0.0 PATH_TRAVERSAL→FILE_WRITE JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The `replaceDirectoryContents` function did not properly sanitize directory names, allowing attackers to traverse the filesystem and execute arbitrary code.
      GHSA-46r5-x6jq-v8g6 MODERATE 0.0 MISSING_AUTHZ→RESOURCE Python
      Package
      mlflow · mlflow/mlflow
      Root cause
      The AJAX endpoint for downloading logged model artifacts was not properly protected by authorization checks.
      GHSA-4g5x-2jfc-xm98 MODERATE 0.0 DOS→RESOURCE_EXHAUSTION JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The original code did not limit the number of media downloads per message, which could lead to excessive disk usage.
      GHSA-4p4f-fc8q-84m3 MODERATE 0.0 UNCLASSIFIED JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not normalize URLs for trust comparison, allowing attackers to bypass security checks by manipulating URL casing or fragments.
      GHSA-5hff-46vh-rxmw MODERATE 0.0 MISSING_AUTHZ→RESOURCE JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly authorize the request before attempting to kill a session.
      GHSA-767m-xrhc-fxm7 LOW 0.0 UNCLASSIFIED JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The `send` and `poll` handlers in `send.ts` did not check for proper authentication before allowing access to admin-class Telegram config and cron persistence.
      GHSA-83f3-hh45-vfw9 MODERATE 0.0 SSRF→INTERNAL_ACCESS JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The application accepted cleartext remote gateway endpoints and sent stored credentials over ws:// without proper validation or sanitization.
      GHSA-846p-hgpv-vphc MODERATE 0.0 PATH_TRAVERSAL→FILE_READ JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly sanitize or validate the input path for local file reading, allowing attackers to read arbitrary files on the server.
      GHSA-98ch-45wp-ch47 MODERATE 0.0 UNCLASSIFIED JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly validate or sanitize environment override keys, allowing attackers to bypass system.run approval binding.
      GHSA-fh32-73r9-rgh5 MODERATE 0.0 SSRF→INTERNAL_ACCESS JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly sanitize the input host by removing trailing dots before checking if it was 'localhost'. This allowed attackers to bypass remote loopback protections.
      GHSA-fh64-r2vc-xvhr MODERATE 0.0 UNSANITIZED_INPUT→XSS Python
      Package
      mlflow · mlflow/mlflow
      Root cause
      Unsafe parsing of YAML-based MLmodel artifacts in the web interface allowed for XSS.
      GHSA-fmwg-qcqh-m992 HIGH 0.0 UNSANITIZED_INPUT→REGEX Go
      Package
      github.com/gotenberg/gotenberg/v8 · gotenberg/gotenberg
      Root cause
      The code did not set a timeout for the regex pattern matching, allowing attackers to exploit a ReDoS vulnerability.
      GHSA-fqrj-m88p-qf3v LOW 0.0 UNCLASSIFIED JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly handle or sanitize error messages that could reveal sensitive information.
      GHSA-fwjq-xwfj-gv75 MODERATE 0.0 UNSANITIZED_INPUT→REGEX JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly sanitize or validate the `agentSessionKey` input before using it to determine session visibility.
      GHSA-h43v-27wg-5mf9 MODERATE 0.0 MISSING_VERIFICATION→SIGNATURE JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The `authorizeSender` function was called before signature verification, allowing forged Nostr DMs to create pairing state.
      GHSA-jj6q-rrrf-h66h MODERATE 0.0 TIMING_SIDE_CHANNEL→TOKEN_LEAK JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code used a vulnerable timing-safe string comparison function that leaked length information through timing.
      GHSA-m34q-h93w-vg5x MODERATE 0.0 PATH_TRAVERSAL→FILE_DELETE JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly validate or sanitize the remote path input, allowing attackers to delete arbitrary remote directories when roots were mis-scoped.
      GHSA-qmwh-9m9c-h36m HIGH 0.0 PATH_TRAVERSAL→FILE_WRITE Go
      Package
      github.com/gotenberg/gotenberg/v8 · gotenberg/gotenberg
      Root cause
      The original code did not properly sanitize user-supplied metadata, allowing attackers to bypass intended restrictions and write arbitrary files using tags like HardLink and SymLink.
      GHSA-rxmx-g7hr-8mx4 MODERATE 0.0 UNCLASSIFIED JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The original code used a single key for deduplication that did not include the chat ID and sender ID, allowing reused message IDs in other chats or from other senders to collide.
      GHSA-vfw7-6rhc-6xxg HIGH 0.0 UNSANITIZED_INPUT→COMMAND JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code directly used environment variables from the backend configuration without sanitizing them.
      GHSA-vjx8-8p7h-82gr MODERATE 0.0 SSRF→INTERNAL_ACCESS JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not validate the URL before following redirects, allowing an attacker to perform SSRF attacks.
      GHSA-w6wx-jq6j-6mcj MODERATE 0.0 UNCLASSIFIED JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly handle the `dlx` command options, allowing for potential injection of malicious operands.
      GHSA-wpc6-37g7-8q4w MODERATE 0.0 UNSANITIZED_INPUT→COMMAND JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The code did not properly sanitize input options for shell wrapper scripts, allowing attackers to execute arbitrary commands through disqualifying script options.
      GHSA-wwfp-w96m-c6x8 MODERATE 0.0 IDOR→DATA_ACCESS JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The pairing requests were not properly grouped by account ID before pruning, allowing an attacker to bypass the pending-request cap per channel.
      GHSA-jmrh-xmgh-x9j4 CRITICAL 9.8 MISSING_AUTH→ENDPOINT Python
      Package
      changedetection.io · dgtlmoon/changedetection.io
      Root cause
      The `login_optionally_required` decorator was moved above the route decorators, allowing unauthenticated access to routes that should be protected.
      GHSA-3p65-76g6-3w7r HIGH 7.5 SSRF→INTERNAL_ACCESS Go
      Package
      github.com/distribution/distribution · distribution/distribution
      Root cause
      The code did not validate the 'realm' parameter in the 'WWW-Authenticate' header, allowing attackers to perform SSRF attacks by manipulating the realm value.
      GHSA-f2g3-hh2r-cwgc HIGH 7.5 UNCLASSIFIED Go
      Package
      github.com/distribution/distribution · distribution/distribution
      Root cause
      The code did not properly validate or sanitize input when interacting with the Redis cache.
      GHSA-h6rj-3m53-887h HIGH 7.5 UNCLASSIFIED PHP
      Package
      pocketmine/pocketmine-mp · pmmp/PocketMine-MP
      Root cause
      The code directly logs the value of an unknown property without sanitizing it.
      GHSA-hv3w-m4g2-5x77 HIGH 7.5 DOS→RESOURCE_EXHAUSTION Python
      Package
      strawberry-graphql · strawberry-graphql/strawberry
      Root cause
      The code did not limit the number of WebSocket subscriptions per connection, allowing an attacker to create an unbounded number of subscriptions.
      GHSA-vpwc-v33q-mq89 HIGH 7.5 UNCLASSIFIED Python
      Package
      strawberry-graphql · strawberry-graphql/strawberry
      Root cause
      The patch adds a new parameter `max_subscriptions_per_connection` but does not enforce any authentication or authorization checks.
      GHSA-jfwg-rxf3-p7r9 HIGH 7.3 UNSANITIZED_INPUT→NOSQL Go
      Package
      github.com/authorizerdev/authorizer · authorizerdev/authorizer
      Root cause
      The code uses `fmt.Sprintf` for string interpolation to construct SQL queries, which can lead to CQL/N1QL injection if user input is not properly sanitized.
      GHSA-cjg8-h5qc-hrjv MODERATE 6.5 PATH_TRAVERSAL→FILE_WRITE Python
      Package
      kedro-datasets · kedro-org/kedro-plugins
      Root cause
      The code did not validate that the partition path was within the base directory, allowing attackers to write arbitrary files outside of intended directories.
      GHSA-q6vj-wxvf-5m8c MODERATE 6.5 BUFFER_OVERFLOW→HEAP Python
      Package
      OpenEXR · AcademySoftwareFoundation/openexr
      Root cause
      The code uses a signed integer for calculations that could lead to underflow, potentially causing a heap buffer overflow.
      GHSA-378j-3jfj-8r9f MODERATE 6.2 BUFFER_OVERFLOW→HEAP Go
      Package
      github.com/ipld/go-ipld-prime · ipld/go-ipld-prime
      Root cause
      The original code did not limit memory allocation based on the size of CBOR headers, leading to potential unbounded memory consumption.
      GHSA-6r34-94wq-jhrc MODERATE 5.9 BUFFER_OVERFLOW→HEAP Ruby
      Package
      rdiscount · davidfstr/rdiscount
      Root cause
      The code did not properly validate the length of the input markdown text before passing it to a function that could cause an out-of-bounds read.
      GHSA-wx4p-jr66-jfp9 LOW 5.3 UNSANITIZED_INPUT→COMMAND JavaScript
      Package
      @nor2/heim-mcp · Nor2-io/heim-mcp
      Root cause
      The original code used `exec` to run a command constructed from user input without proper sanitization.
      GHSA-xqv9-qr76-hfq2 LOW 5.3 UNSANITIZED_INPUT→COMMAND JavaScript
      Package
      @elgentos/magento2-dev-mcp · elgentos/magento2-dev-mcp
      Root cause
      The code used `exec` to run user-supplied arguments directly without sanitization.
      GHSA-7hmv-4j2j-pp6f MODERATE 4.3 DOS→AMPLIFICATION PHP
      Package
      pocketmine/pocketmine-mp · pmmp/PocketMine-MP
      Root cause
      The `handleActorEvent` method was not properly filtering or validating the `actorRuntimeId`, allowing an attacker to amplify network traffic.
      GHSA-f9jp-856v-8642 LOW 3.7 UNCLASSIFIED PHP
      Package
      pocketmine/pocketmine-mp · pmmp/PocketMine-MP
      Root cause
      The code does not properly check if a player is connected before allowing them to interact with the game.
      GHSA-36xv-jgw5-4q75 MODERATE 0.0 UNCLASSIFIED JavaScript
      Package
      @nestjs/core · nestjs/nest
      Root cause
      The code did not properly sanitize input before using it in an output that could be processed by a downstream component.
      GHSA-4w7w-66w2-5vf9 MODERATE 0.0 PATH_TRAVERSAL→FILE_READ JavaScript
      Package
      vite · vitejs/vite
      Root cause
      The code did not validate the path before reading the file, allowing attackers to traverse directories and access files outside of the intended directory.
      GHSA-788v-5pfp-93ff HIGH 0.0 UNCLASSIFIED PHP
      Package
      pocketmine/pocketmine-mp · pmmp/PocketMine-MP
      Root cause
      The application did not limit the size of JSON data it could decode, allowing attackers to send extremely large payloads that could consume excessive memory or cause denial of service.
      GHSA-fvx6-pj3r-5q4q MODERATE 0.0 UNSANITIZED_INPUT→COMMAND JavaScript
      Package
      openclaw · openclaw/openclaw
      Root cause
      The interpreter pipelines could skip preflight validation for exec scripts, allowing potentially unsafe commands to be executed.
      GHSA-p9ff-h696-f583 HIGH 0.0 PATH_TRAVERSAL→FILE_READ JavaScript
      Package
      vite · vitejs/vite
      Root cause
      The code did not properly sanitize the input `id` before using it to access files, allowing an attacker to read arbitrary files on the server.
      GHSA-v2wj-q39q-566r HIGH 0.0 UNCLASSIFIED JavaScript
      Package
      vite · vitejs/vite
      Root cause
      The code does not appear to directly address a known security vulnerability based on the provided diff.
      GHSA-x3f4-v83f-7wp2 HIGH 0.0 OPEN_REDIRECT→PHISHING Go
      Package
      github.com/authorizerdev/authorizer · authorizerdev/authorizer
      Root cause
      The application did not validate the `redirect_uri` parameter before using it to redirect users.