Threat intelligence

No-CVE advisories — confirmed fixes, zero tracking

Security advisories published on GHSA with severity scores and fix commits, but no CVE identifier assigned. Without a CVE, vulnerability scanners cannot detect affected systems. Downstream users remain unaware and unpatched — creating an exploitation window that APT groups actively monitor.

!
Why this matters. Nation-state actors systematically monitor open source commits for security fixes that lack public disclosure. A fix without a CVE is a roadmap to an exploitable vulnerability in every unpatched installation. These 150 advisories represent confirmed vulnerabilities with available fixes but zero CVE tracking.
150
Fixes without CVE
10
Critical severity
55
High severity
297
Total advisories
GHSA-246w-jgmq-88fg No CVE CRITICAL 10.0 MISSING_AUTH→ENDPOINT Go
Package
github.com/jkroepke/openvpn-auth-oauth2 · jkroepke/openvpn-auth-oauth2
Root cause
The application incorrectly returned 'FUNC_SUCCESS' even when a client's authentication was explicitly denied or an error occurred during the authentication process. This misinterpretation of the return code by OpenVPN led to clients being granted access despite failing authentication.
GHSA-gph2-j4c9-vhhr No CVE CRITICAL 10.0 UNSANITIZED_INPUT→XSS PHP
Package
wwbn/avideo · WWBN/AVideo
Root cause
The application's WebSocket broadcast relay allowed unauthenticated users to inject arbitrary JavaScript code into messages. Specifically, the 'autoEvalCodeOnHTML' field and the 'callback' field in WebSocket messages were not properly sanitized or validated before being relayed to other clients, which would then execute the injected code via client-side eval() sinks.
GHSA-9cp7-j3f8-p5jx No CVE CRITICAL 10.0 PATH_TRAVERSAL→FILE_WRITE Go
Package
github.com/daptin/daptin · daptin/daptin
Root cause
The application allowed user-supplied filenames and archive entry names to be used directly in file system operations (e.g., `filepath.Join`, `os.OpenFile`, `os.MkdirAll`) without sufficient sanitization. This enabled attackers to manipulate file paths using `../` sequences or absolute paths.
GHSA-9qhq-v63v-fv3j No CVE CRITICAL 9.8 UNSANITIZED_INPUT→COMMAND Python
Package
praisonai · MervinPraison/PraisonAI
Root cause
The code did not validate the executable part of the command input.
GHSA-2689-5p89-6j3j No CVE CRITICAL 9.8 BUFFER_OVERFLOW→STACK Python
Package
uefi-firmware · theopolis/uefi-firmware-parser
Root cause
The `MakeTable` function, responsible for creating Huffman code mapping tables, did not adequately validate the `BitLen` array values. Specifically, it failed to check if `BitLen[Index]` exceeded 16 or if `Start[Len]` (calculated from `BitLen`) could lead to an out-of-bounds write when indexing the `Table` array, which is allocated on the stack.
GHSA-hm2w-vr2p-hq7w No CVE CRITICAL 9.8 BUFFER_OVERFLOW→HEAP Python
Package
uefi-firmware · theopolis/uefi-firmware-parser
Root cause
The vulnerability existed in the `MakeTable` function within the Tiano decompressor. Specifically, the `Table` array, which is used to store Huffman code mappings, could be written to beyond its allocated bounds if the calculated `Index` or `NextCode` values exceeded the expected `TableSize` (or `MaxTableLength`). This was due to insufficient bounds checking on the `Index` variable before writing to `Table[Index]`, particularly when `Len` was less than or equal to `TableBits`.
GHSA-v529-vhwc-wfc5 No CVE CRITICAL 9.6 UNSANITIZED_INPUT→SQL Ruby
Package
openc3 · OpenC3/cosmos
Root cause
The application directly embedded user-controlled input (start_time, end_time, col_name) into SQL queries without proper sanitization or parameterization. This allowed an attacker to inject arbitrary SQL code by crafting malicious input values.
GHSA-6973-8887-87ff No CVE CRITICAL 9.6 INTEGER_OVERFLOW→BOUNDARY RUST
Package
nimiq-block · nimiq/core-rs-albatross
Root cause
The vulnerability stemmed from improper validation of `BitSet` indices representing validator slots. An attacker could craft a `BitSet` with out-of-range indices or indices that, when truncated to `u16`, would map to valid slots. This allowed them to bypass the quorum check for skip blocks and equivocation proofs by making it appear as if enough validators had signed, even if they hadn't.
GHSA-6g38-8j4p-j3pr No CVE CRITICAL 0.0 IDOR→DATA_ACCESS Go
Package
github.com/nhost/nhost · nhost/nhost
Root cause
The code did not properly verify the email verification status of the user profile.
GHSA-xh72-v6v9-mwhc No CVE CRITICAL 0.0 MISSING_AUTH→ENDPOINT JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not validate the presence of an encryptKey before processing requests.
GHSA-8h25-q488-4hxw No CVE HIGH 8.8 UNSANITIZED_INPUT→COMMAND JavaScript
Package
openlearnx · th30d4y/OpenLearnX
Root cause
The application allowed users to execute arbitrary code in a sandboxed environment (Docker containers). However, the initial sandbox implementation for Python lacked robust static analysis to prevent the import of dangerous modules or the use of sensitive functions, enabling an attacker to escape the sandbox and execute arbitrary commands on the host system.
GHSA-2gw9-c2r2-f5qf No CVE HIGH 8.8 PRIVILEGE_ESCALATION→ROLE Go
Package
github.com/m1k1o/neko/server · m1k1o/neko
Root cause
The application allowed authenticated users to update their profile without proper authorization checks on all fields. Specifically, the `IsAdmin` field within the user's session profile could be modified by a non-admin user through the `UpdateProfile` API endpoint.
GHSA-66hx-chf7-3332 No CVE HIGH 8.8 PRIVILEGE_ESCALATION→ROLE Python
Package
pyload-ng · pyload/pyload
Root cause
The application did not invalidate user sessions when a user's password, role, or permissions were changed. This allowed users to retain their old privileges until their session naturally expired or they manually logged out, even after an administrator had downgraded their access.
GHSA-jvff-x2qm-6286 No CVE HIGH 8.8 UNCLASSIFIED JavaScript
Package
mathjs · josdejong/mathjs
Root cause
The code did not validate that the index parameter was an array, allowing attackers to manipulate object attributes improperly.
GHSA-c3h8-g69v-pjrg No CVE HIGH 8.6 UNSANITIZED_INPUT→HEADER JavaScript
Package
i18next-http-middleware · i18next/i18next-http-middleware
Root cause
The application failed to properly sanitize user-controlled input, specifically the 'Content-Language' header and language/namespace identifiers. This allowed attackers to inject control characters into HTTP headers, leading to response splitting, and to use specially crafted strings (e.g., '__proto__', '..', '/', '\') to trigger prototype pollution, path traversal, or denial-of-service conditions when these values were used in internal operations or forwarded to backend connectors.
GHSA-m6rx-7pvw-2f73 No CVE HIGH 8.4 UNCLASSIFIED JavaScript
Package
@gitlawb/openclaude · Gitlawb/openclaude
Root cause
The vulnerability existed because the sandbox permission check logic had an early-exit flaw. It only explicitly handled 'passthrough' behavior, allowing 'deny' or 'ask' behaviors to implicitly bypass the intended security checks and proceed as if permission was granted.
GHSA-vvfw-4m39-fjqf No CVE HIGH 8.3 CSRF→STATE_CHANGE PHP
Package
wwbn/avideo · WWBN/AVideo
Root cause
The application's configuration update endpoint (configurationUpdate.json.php) lacked proper CSRF protection. This allowed an attacker to craft a malicious request that, when triggered by an authenticated administrator, would modify the site's configuration without the administrator's explicit consent.
GHSA-6v7q-wjvx-w8wg No CVE HIGH 8.2 UNSANITIZED_INPUT→COMMAND JavaScript
Package
basic-ftp · patrickjuchli/basic-ftp
Root cause
The code did not properly sanitize input for FTP commands, allowing control characters to be injected.
GHSA-75hx-xj24-mqrw No CVE HIGH 8.2 MISSING_AUTH→ENDPOINT JavaScript
Package
n8n-mcp · czlonkowski/n8n-mcp
Root cause
The code did not handle authentication errors securely, potentially revealing sensitive information in error messages.
GHSA-wgx6-g857-jjf7 No CVE HIGH 8.1 PRIVILEGE_ESCALATION→ROLE Ruby
Package
openc3 · OpenC3/cosmos
Root cause
The `verify_no_service` method, intended to verify either a password or a session token, had a flaw where it would prioritize checking for a session token even when explicitly told to only check for a password. This meant that if an attacker had a valid session token, they could use it in place of a password to perform actions that should require the actual user's password, such as resetting the password.
GHSA-ccq9-r5cw-5hwq No CVE HIGH 8.1 CORS_MISCONFIGURATION→ORIGIN PHP
Package
wwbn/avideo · WWBN/AVideo
Root cause
The application's CORS policy, specifically in the `allowOrigin` function when `allowAll` was true, would reflect the `Origin` header from the request and set `Access-Control-Allow-Credentials: true`. This was intended for public resources but was applied to sensitive API endpoints, allowing any origin to make credentialed requests.
GHSA-4948-f92q-f432 No CVE HIGH 7.5 UNSANITIZED_INPUT→SQL JavaScript
Package
@nocobase/database · nocobase/nocobase
Root cause
The application constructed SQL queries by directly concatenating user-controlled input (e.g., `scopeValue`, `nodeIds`) into the SQL string without proper sanitization or using parameterized queries. This allowed an attacker to inject arbitrary SQL code.
GHSA-7c4j-2m43-2mgh No CVE HIGH 7.5 DOS→RESOURCE_EXHAUSTION RUST
Package
nimiq-primitives · nimiq/core-rs-albatross
Root cause
The vulnerability stemmed from insufficient validation of BLS voting keys within election macro block proposals. An attacker could craft a block containing an invalid BLS public key that, when processed by a node, would cause a panic (uncompress().unwrap()) during the hashing or verification process, leading to a node crash.
GHSA-w937-fg2h-xhq2 No CVE HIGH 7.5 UNSANITIZED_INPUT→XSS JavaScript
Package
locize · locize/locize
Root cause
The vulnerability stemmed from two main issues: a lack of origin validation for incoming postMessage events and insufficient sanitization of HTML content and attribute values provided by the InContext editor. An attacker could send malicious messages from any origin, which would then be processed and potentially lead to script execution or attribute manipulation.
GHSA-7gcj-phff-2884 No CVE HIGH 7.5 DOS→RESOURCE_EXHAUSTION JavaScript
Package
signalk-server · SignalK/signalk-server
Root cause
The vulnerability description mentions an "Unauthenticated Regular Expression Denial of Service (ReDoS) via WebSocket Subscription Paths". However, the provided diff primarily addresses a different issue: the lack of rate limiting for login attempts over WebSockets. Previously, only HTTP login attempts were rate-limited using 'express-rate-limit'. WebSocket login attempts were not subject to any rate limiting, allowing an attacker to make an unlimited number of login attempts.
GHSA-h6rj-3m53-887h No CVE HIGH 7.5 UNCLASSIFIED PHP
Package
pocketmine/pocketmine-mp · pmmp/PocketMine-MP
Root cause
The code directly logs the value of an unknown property without sanitizing it.
GHSA-jfwg-rxf3-p7r9 No CVE HIGH 7.3 UNSANITIZED_INPUT→NOSQL Go
Package
github.com/authorizerdev/authorizer · authorizerdev/authorizer
Root cause
The code uses `fmt.Sprintf` for string interpolation to construct SQL queries, which can lead to CQL/N1QL injection if user input is not properly sanitized.
GHSA-wrwh-c28m-9jjh No CVE HIGH 7.2 UNSANITIZED_INPUT→SQL JavaScript
Package
@nocobase/plugin-collection-sql · nocobase/nocobase
Root cause
The vulnerability existed because the 'update' action in the SQL resource did not properly validate user-supplied SQL queries. While a 'checkSQL' function was available for validation, it was not called for the 'update' operation, allowing malicious SQL to be processed.
GHSA-m8mh-x359-vm8m No CVE HIGH 7.1 PATH_TRAVERSAL→FILE_WRITE Java
Package
org.apktool:apktool-lib · iBotPeaches/Apktool
Root cause
The application constructed file paths for output by concatenating user-controlled input (entry.getTypeName(), entry.getConfig().getQualifiers(), entry.getName(), and ext) without sufficient sanitization. Although there was a `detectPossibleDirectoryTraversal` check, it was bypassed, allowing an attacker to inject path traversal sequences like `../` into the generated `outResPath`.
GHSA-ff5q-cc22-fgp4 No CVE HIGH 7.1 CORS_MISCONFIGURATION→ORIGIN PHP
Package
wwbn/avideo · WWBN/AVideo
Root cause
The application reflected the `HTTP_ORIGIN` header directly into the `Access-Control-Allow-Origin` header for all API requests, including authenticated ones. This allowed an attacker to bypass the Same-Origin Policy.
GHSA-ffw8-fwxp-h64w No CVE HIGH 7.1 CSRF→STATE_CHANGE PHP
Package
wwbn/avideo · WWBN/AVideo
Root cause
The application's administrative JSON endpoints lacked proper CSRF protection. This allowed an attacker to craft malicious requests that, when executed by an authenticated administrator, would perform actions without the administrator's explicit consent.
GHSA-pg8g-f2hf-x82m No CVE HIGH 6.5 SSRF→INTERNAL_ACCESS JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The original code did not properly sanitize or validate the request body before sending it across cross-origin redirects.
GHSA-29v9-frvh-c426 No CVE HIGH 0.0 SSRF→INTERNAL_ACCESS Go
Package
github.com/monetr/monetr · monetr/monetr
Root cause
The application allowed an attacker to specify an arbitrary URL for the Lunch Flow API, which was then used to make server-side requests. There was no validation or allowlist in place to restrict the target URLs, enabling the server to connect to internal networks or other arbitrary external services.
GHSA-8c75-8mhr-p7r9 No CVE HIGH 0.0 BUFFER_OVERFLOW→HEAP RUST
Package
openssl · rust-openssl/rust-openssl
Root cause
The `unwrap_key` function in `rust-openssl` contained an incorrect assertion for the output buffer size. It incorrectly checked if `out.len() + 8 <= in_.len()` (output buffer size plus 8 bytes for integrity check was less than or equal to input length), instead of `out.len() + 8 >= in_.len()` (output buffer size plus 8 bytes was greater than or equal to input length). This logic error meant that the function would not panic if the output buffer was too small to hold the unwrapped key, potentially leading to a buffer overflow when `ffi::AES_unwrap_key` attempts to write beyond the allocated `out` buffer.
GHSA-f6ww-3ggp-fr8h No CVE HIGH 0.0 UNCLASSIFIED JavaScript
Package
xmldom · xmldom/xmldom
Root cause
The xmldom library did not validate the `publicId`, `systemId`, and `internalSubset` properties of a `DocumentType` node during serialization. This allowed an attacker to inject arbitrary XML content into the Document Type Declaration (DTD) when an XML document was serialized, bypassing well-formedness checks.
GHSA-ghm9-cr32-g9qj No CVE HIGH 0.0 BUFFER_OVERFLOW→HEAP RUST
Package
openssl · rust-openssl/rust-openssl
Root cause
The `digest_final` function in `rust-openssl` did not perform a length check to ensure that the provided output buffer was large enough to hold the entire digest. It would attempt to write the digest into the buffer regardless of its size, potentially writing past the allocated memory.
GHSA-hjh7-r5w8-5872 No CVE HIGH 0.0 PATH_TRAVERSAL→FILE_READ Go
Package
github.com/siyuan-note/siyuan/kernel · siyuan-note/siyuan
Root cause
The application failed to properly validate user-supplied paths in the `/export/` endpoint, specifically when dealing with double URL encoded characters. An incomplete fix for a previous vulnerability allowed attackers to bypass path sanitization by double-encoding path traversal sequences (e.g., `%252e%252e%252f`), leading to access outside the intended export directory.
GHSA-hppc-g8h3-xhp3 No CVE HIGH 0.0 INFO_DISCLOSURE→ERROR_MESSAGE RUST
Package
openssl · rust-openssl/rust-openssl
Root cause
The vulnerability stemmed from an unchecked return value from user-provided callbacks in PSK and cookie handling. These callbacks were expected to write data into a provided buffer and return the length of the data written. However, the `rust-openssl` library did not verify if the returned length exceeded the actual capacity of the buffer, leading to a potential out-of-bounds read.
GHSA-p3h2-2j4p-p83g No CVE HIGH 0.0 PATH_TRAVERSAL→FILE_DELETE JavaScript
Package
@samanhappy/mcphub · samanhappy/mcphub
Root cause
The application used user-supplied input (manifest.name) directly in file path operations without proper validation or sanitization. This allowed an attacker to inject path traversal sequences (e.g., '..') into the server name, causing file operations to occur outside the intended directory.
GHSA-pqf5-4pqq-29f5 No CVE HIGH 0.0 BUFFER_OVERFLOW→HEAP RUST
Package
openssl · rust-openssl/rust-openssl
Root cause
On OpenSSL 1.1.x, certain key derivation methods (like X25519, X448, HKDF-extract) ignored the provided buffer length and unconditionally wrote the full natural output size. If the caller provided a buffer shorter than this natural size, an out-of-bounds write would occur.
GHSA-x6wf-f3px-wcqx No CVE HIGH 0.0 UNCLASSIFIED JavaScript
Package
xmldom · xmldom/xmldom
Root cause
The `xmldom` library's `createProcessingInstruction` function did not perform input validation on the `target` and `data` arguments. This allowed attackers to inject malformed processing instructions that could lead to XML node injection during serialization if the `requireWellFormed` option was not enabled.
GHSA-g5pq-48mj-jvw8 No CVE HIGH 0.0 SSRF→INTERNAL_ACCESS Python
Package
glances · nicolargo/glances
Root cause
The Glances IP plugin allowed an attacker to configure an arbitrary URL for fetching public IP information via the `public_api` setting. The application would then make a request to this user-controlled URL without proper validation of the scheme or host, leading to Server-Side Request Forgery (SSRF).
GHSA-gfc2-9qmw-w7vh No CVE HIGH 0.0 CORS_MISCONFIGURATION→ORIGIN Python
Package
Glances · nicolargo/glances
Root cause
The Glances REST API, when run without authentication and with the default permissive CORS policy (Access-Control-Allow-Origin: *), allowed any web page to make cross-origin requests and read sensitive system metrics. This misconfiguration exposed the API to unauthorized access from arbitrary origins.
GHSA-x234-x5vq-cc2v No CVE HIGH 0.0 MISSING_AUTH→ENDPOINT Go
Package
github.com/0xJacky/Nginx-UI · 0xJacky/nginx-ui
Root cause
The application did not invalidate existing authentication tokens when a user's status was changed to disabled or when their password was updated. This allowed previously issued bearer tokens to remain valid, granting full API access to disabled users or users whose passwords had been reset.
GHSA-2cq5-mf3v-mx44 No CVE HIGH 0.0 UNCLASSIFIED JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The patch introduces a new set of mutable script runners without proper validation or approval mechanisms.
GHSA-2gvc-4f3c-2855 No CVE HIGH 0.0 MISSING_AUTHZ→RESOURCE JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not properly check if the sender is allowed to access the resource based on the room configuration and store entries.
GHSA-525j-hqq2-66r4 No CVE HIGH 0.0 SSRF→INTERNAL_ACCESS JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not properly sanitize the Docker network gateway IP address when deriving the effective CDP source range, allowing an attacker to potentially exploit this by sending malicious requests through the exposed DevTools protocol.
GHSA-66r7-m7xm-v49h No CVE HIGH 0.0 PATH_TRAVERSAL→FILE_READ JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code directly uses user input to construct file paths without proper sanitization or validation, allowing attackers to read arbitrary local files.
GHSA-82qx-6vj7-p8m2 No CVE HIGH 0.0 UNCLASSIFIED JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code does not appear to contain any direct security vulnerabilities based on the provided diff.
GHSA-8372-7vhw-cm6q No CVE HIGH 0.0 UNCLASSIFIED JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code was not properly redacting sensitive data from the config snapshot, allowing potentially unredacted data to be exposed.
GHSA-939r-rj45-g2rj No CVE HIGH 0.0 UNCLASSIFIED JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not properly validate or sanitize input related to plugin provider choices, allowing untrusted providers to be auto-enabled.
GHSA-mr34-9552-qr95 No CVE HIGH 0.0 UNCLASSIFIED JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The patch does not introduce any new security vulnerabilities based on the provided diff.
GHSA-vw3h-q6xq-jjm5 No CVE HIGH 0.0 BUFFER_OVERFLOW→HEAP JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The WebSocket server did not limit the size of incoming messages, allowing attackers to send oversized frames that could potentially lead to a heap buffer overflow.
GHSA-xmxx-7p24-h892 No CVE HIGH 0.0 MISSING_AUTH→ENDPOINT JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code does not re-resolve bearer auth after SecretRef rotation, allowing attackers to use outdated authentication tokens.
GHSA-xr6f-h4x7-r6qp No CVE HIGH 0.0 UNSANITIZED_INPUT→COMMAND PHP
Package
wwbn/avideo · WWBN/AVideo
Root cause
The `cloneSiteURL` parameter was not properly sanitized before being used in a command execution context.
GHSA-4x48-cgf9-q33f No CVE HIGH 0.0 SSRF→INTERNAL_ACCESS JavaScript
Package
@novu/api · novuhq/novu
Root cause
The application allowed users to specify webhook URLs in conditions filters. While a `validateUrlSsrf()` function existed, it was not being called for webhook URLs within the conditions filter logic, allowing an attacker to bypass existing SSRF protection and make requests to internal resources.
GHSA-9c4q-hq6p-c237 No CVE HIGH 0.0 UNCLASSIFIED Go
Package
github.com/minio/minio · minio/minio
Root cause
The patch does not address any security issue related to missing signature verification.
GHSA-hv4r-mvr4-25vw No CVE HIGH 0.0 MISSING_AUTH→ENDPOINT Go
Package
github.com/minio/minio · minio/minio
Root cause
The vulnerability stemmed from a bypass in the query-string credential signature validation for unsigned-trailer uploads. MinIO failed to properly authenticate requests when specific conditions related to unsigned trailers were met, allowing an attacker to write objects without valid credentials.
GHSA-pm7q-rjjx-979p No CVE HIGH 0.0 CREDENTIAL_LEAK→LOG_EXPOSURE Go
Package
github.com/oxia-db/oxia · oxia-db/oxia
Root cause
The application was logging the full bearer token in debug messages when an authentication failure occurred. This meant that if debug logging was enabled, the sensitive authentication token could be exposed in logs, making it accessible to anyone with access to the log files.
GHSA-pq8p-wc4f-vg7j No CVE HIGH 0.0 MISSING_AUTH→ENDPOINT PHP
Package
wwbn/avideo · WWBN/AVideo
Root cause
The application previously had a command injection vulnerability (CVE-2026-33502) in the `wget` function, which was used to fetch content from a URL provided by user input. The original fix was incomplete, as it did not restrict access to the `test.php` endpoint, allowing unauthenticated attackers to still trigger the vulnerable `wget` function.
GHSA-7437-7hg8-frrw No CVE HIGH 0.0 UNSANITIZED_INPUT→COMMAND JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not properly sanitize or denylist certain environment variables that could be used for command injection.
GHSA-qmwh-9m9c-h36m No CVE HIGH 0.0 PATH_TRAVERSAL→FILE_WRITE Go
Package
github.com/gotenberg/gotenberg/v8 · gotenberg/gotenberg
Root cause
The original code did not properly sanitize user-supplied metadata, allowing attackers to bypass intended restrictions and write arbitrary files using tags like HardLink and SymLink.
GHSA-vfw7-6rhc-6xxg No CVE HIGH 0.0 UNSANITIZED_INPUT→COMMAND JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code directly used environment variables from the backend configuration without sanitizing them.
GHSA-788v-5pfp-93ff No CVE HIGH 0.0 UNCLASSIFIED PHP
Package
pocketmine/pocketmine-mp · pmmp/PocketMine-MP
Root cause
The application did not limit the size of JSON data it could decode, allowing attackers to send extremely large payloads that could consume excessive memory or cause denial of service.
GHSA-x3f4-v83f-7wp2 No CVE HIGH 0.0 OPEN_REDIRECT→PHISHING Go
Package
github.com/authorizerdev/authorizer · authorizerdev/authorizer
Root cause
The application did not validate the `redirect_uri` parameter before using it to redirect users.
GHSA-8j7f-g9gv-7jhc No CVE MODERATE 7.4 SSRF→INTERNAL_ACCESS JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not validate the target URL before making requests, allowing attackers to perform SSRF attacks.
GHSA-p6j4-wvmc-vx2h No CVE MODERATE 7.3 MISSING_AUTHZ→RESOURCE JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code does not properly check if the user has authorization to access or modify certain resources before performing operations on them.
GHSA-rmx9-2pp3-xhcr No CVE MODERATE 6.5 RACE_CONDITION→TOCTOU Go
Package
github.com/tektoncd/pipeline · tektoncd/pipeline
Root cause
The vulnerability existed because the VerificationPolicy was being listed multiple times within a single reconcile loop, specifically for each pipeline task. This repeated listing could lead to inconsistencies or race conditions, allowing an attacker to bypass the intended regex pattern matching for trusted resources by manipulating the timing or state of the policies.
GHSA-gpgp-w4x2-h3h7 No CVE MODERATE 6.5 IDOR→DATA_ACCESS PHP
Package
wwbn/avideo · WWBN/AVideo
Root cause
The code did not properly restrict access to the Live Restreams list based on user permissions, allowing non-admin users to view other users' stream keys and OAuth tokens.
GHSA-m63r-m9jh-3vc6 No CVE MODERATE 6.5 PATH_TRAVERSAL→FILE_READ PHP
Package
wwbn/avideo · WWBN/AVideo
Root cause
The code did not properly sanitize the `downloadURL` parameter, allowing attackers to traverse directories and access files outside of the intended directory.
GHSA-2j53-2c28-g9v2 No CVE MODERATE 6.5 UNCLASSIFIED JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code does not enforce sender policy checks before allowing expensive cryptographic operations.
GHSA-h9mw-h4qc-f5jf No CVE MODERATE 6.5 DOS→RESOURCE_EXHAUSTION Go
Package
github.com/platform-mesh/kubernetes-graphql-gateway · platform-mesh/kubernetes-graphql-gateway
Root cause
The GraphQL endpoint did not validate the complexity or depth of queries, allowing authenticated users to execute arbitrarily complex queries that could exhaust resources.
GHSA-grp3-h8m8-45p7 No CVE MODERATE 6.3 UNSANITIZED_INPUT→NOSQL Python
Package
glances · nicolargo/glances
Root cause
The Glances Cassandra export module constructed CQL queries using configuration values (keyspace and table names) directly without proper validation or sanitization. An attacker could inject malicious CQL into these configuration parameters, which would then be executed by the Cassandra client.
GHSA-xq8m-7c5p-c2r6 No CVE MODERATE 5.4 INSECURE_DEFAULT→CONFIG JavaScript
Package
@auth0/nextjs-auth0 · auth0/nextjs-auth0
Root cause
The Auth0 Next.js SDK was caching the entire `Fetcher` instance, including its `getAccessToken` method, which is responsible for resolving tokens for proxied requests. When multiple requests for the same audience were made, the cached `Fetcher` instance's `getAccessToken` method could be overridden by a subsequent request, leading to token resolution issues where a token from a different session might be used.
GHSA-8pv3-29pp-pf8f No CVE MODERATE 5.4 UNSANITIZED_INPUT→XSS PHP
Package
wwbn/avideo · WWBN/AVideo
Root cause
The duration value was not properly sanitized before being outputted in the HTML.
GHSA-8qm8-g55h-xmqr No CVE MODERATE 5.4 CSRF→STATE_CHANGE PHP
Package
wwbn/avideo · WWBN/AVideo
Root cause
The commentDelete.json.php endpoint lacked CSRF protection, allowing attackers to perform mass comment deletion without proper authentication.
GHSA-x2pw-9c38-cp2j No CVE MODERATE 5.4 CSRF→STATE_CHANGE PHP
Package
wwbn/avideo · WWBN/AVideo
Root cause
The endpoints were missing CSRF protection, allowing attackers to perform state-changing actions without proper authentication.
GHSA-793q-xgj6-7frp No CVE MODERATE 5.3 SSRF→INTERNAL_ACCESS PHP
Package
wwbn/avideo · WWBN/AVideo
Root cause
The original code did not properly validate the redirect URL before performing an SSRF check.
GHSA-hg7g-56h5-5pqr No CVE MODERATE 5.3 SESSION_FIXATION→HIJACK PHP
Package
wwbn/avideo · WWBN/AVideo
Root cause
The vulnerability existed because the session token was not invalidated on failure, allowing an attacker to hijack a user's session.
GHSA-8f9r-gr6r-x63q No CVE MODERATE 5.3 MISSING_VERIFICATION→SIGNATURE JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code reads and parses the request body before validating the signature.
GHSA-vj8v-p5vw-m6v5 No CVE MODERATE 5.3 PATH_TRAVERSAL→FILE_READ Python
Package
xrootd · xrootd/xrootd
Root cause
The code did not properly sanitize input for directory traversal, allowing access to parent directories via trailing '..' patterns.
GHSA-26pp-8wgv-hjvm No CVE MODERATE 5.3 UNCLASSIFIED JavaScript
Package
hono · honojs/hono
Root cause
The code did not validate the cookie name before setting it, allowing for injection of invalid characters.
GHSA-xjvc-pw2r-6878 No CVE MODERATE 4.9 PATH_TRAVERSAL→FILE_READ PHP
Package
flarum/core · flarum/framework
Root cause
The previous fix for CVE-2023-27577 only restricted dangerous LESS features like `@import` and `data-uri()` in the `custom_less` setting. However, other settings, such as theme color settings, were also interpolated directly into the LESS source without similar restrictions, allowing an attacker to inject these features through those variables.
GHSA-vvjj-xcjg-gr5g No CVE MODERATE 4.9 UNSANITIZED_INPUT→COMMAND JavaScript
Package
nodemailer · nodemailer/nodemailer
Root cause
The code did not sanitize the input for the SMTP transport name option, allowing attackers to inject CRLF sequences.
GHSA-59xc-5v89-r7pr No CVE MODERATE 4.8 UNCLASSIFIED JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code does not properly rate-limit requests based on invalid tokens, allowing brute-force guessing of webhook tokens.
GHSA-4jvx-93h3-f45h No CVE MODERATE 4.3 PATH_TRAVERSAL→FILE_WRITE Ruby
Package
openc3 · OpenC3/cosmos
Root cause
The application allowed user-supplied input for 'tool' and 'name' parameters to be used directly in file path constructions when saving or loading configurations. This lack of input validation meant that an attacker could inject path traversal sequences (e.g., '..', '/', '\') to manipulate the intended file paths.
GHSA-55v6-g8pm-pw4c No CVE MODERATE 4.3 SSRF→INTERNAL_ACCESS Python
Package
rembg · danielgatis/rembg
Root cause
The application did not properly validate or sanitize URLs passed to it, allowing attackers to perform SSRF attacks by providing internal IP addresses or other malicious URLs.
GHSA-7hmv-4j2j-pp6f No CVE MODERATE 4.3 DOS→AMPLIFICATION PHP
Package
pocketmine/pocketmine-mp · pmmp/PocketMine-MP
Root cause
The `handleActorEvent` method was not properly filtering or validating the `actorRuntimeId`, allowing an attacker to amplify network traffic.
GHSA-6vgr-cp5c-ffx3 No CVE MODERATE 0.0 UNSANITIZED_INPUT→SQL Go
Package
github.com/openbao/openbao · openbao/openbao
Root cause
The vulnerability existed because the 'schema' variable, which could contain user-controlled input, was directly interpolated into a SQL query string without proper escaping or quoting. This allowed an attacker to inject arbitrary SQL commands into the `REVOKE ALL PRIVILEGES` statement.
GHSA-2767-2q9v-9326 No CVE MODERATE 0.0 SSRF→INTERNAL_ACCESS JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not validate or sanitize the URL before making a request, allowing an attacker to trigger SSRF.
GHSA-49cg-279w-m73x No CVE MODERATE 0.0 MISSING_AUTHZ→RESOURCE JavaScript
Package
openclaw · openclaw/openclaw
Root cause
Empty approver lists could grant explicit approval authorization without proper validation.
GHSA-527m-976r-jf79 No CVE MODERATE 0.0 SSRF→INTERNAL_ACCESS JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The existing-session browser interaction routes did not properly enforce SSRF policy enforcement.
GHSA-536q-mj95-h29h No CVE MODERATE 0.0 SSRF→INTERNAL_ACCESS JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code missed complete navigation guard coverage for SSRF vulnerabilities.
GHSA-5gjc-grvm-m88j No CVE MODERATE 0.0 MISSING_AUTHZ→RESOURCE JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The operator.write commands were not properly restricted to require the 'operator.admin' scope.
GHSA-7g8c-cfr3-vqqr No CVE MODERATE 0.0 UNSANITIZED_INPUT→XSS JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not sanitize the `name` field from external input before using it in system events.
GHSA-7wv4-cc7p-jhxc No CVE MODERATE 0.0 OPEN_REDIRECT→PHISHING JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not properly sanitize environment variables that could be used for endpoint redirection.
GHSA-92jp-89mq-4374 No CVE MODERATE 0.0 MISSING_AUTH→ENDPOINT JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The original code did not check if the browser authentication was verified before exposing the interactive browser session credentials.
GHSA-c4qm-58hj-j6pj No CVE MODERATE 0.0 SSRF→INTERNAL_ACCESS JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not validate the URL before navigating to it, allowing an attacker to perform SSRF attacks.
GHSA-c9h3-5p7r-mrjh No CVE MODERATE 0.0 UNCLASSIFIED JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The vulnerability existed because the code did not properly sanitize input related to media parameters.
GHSA-f7fh-qg34-x2xh No CVE MODERATE 0.0 SSRF→INTERNAL_ACCESS JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not validate the target URL before establishing a WebSocket connection.
GHSA-f934-5rqf-xx47 No CVE MODERATE 0.0 PATH_TRAVERSAL→FILE_READ JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not properly sanitize the input path, allowing attackers to read arbitrary files on the server.
GHSA-g2hm-779g-vm32 No CVE MODERATE 0.0 PRIVILEGE_ESCALATION→ROLE JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The system incorrectly assumed that 'wake-triggered' events, especially those from untrusted webhooks, would not lead to a full heartbeat run if no tasks were due. This allowed untrusted events to bypass the 'senderIsOwner' check, which is crucial for restricting actions to authorized users, leading to a potential privilege escalation.
GHSA-g375-h3v6-4873 No CVE MODERATE 0.0 UNSANITIZED_INPUT→COMMAND JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The original regex did not properly sanitize input, allowing for potential command injection.
GHSA-j6c7-3h5x-99g9 No CVE MODERATE 0.0 UNCLASSIFIED JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not properly detect and handle shell-wrapper detection, allowing for potential injection of environment assignment keys.
GHSA-jf25-7968-h2h5 No CVE MODERATE 0.0 PATH_TRAVERSAL→FILE_WRITE JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not properly sanitize or validate the `outPath` parameter when writing files to a workspace-only filesystem.
GHSA-jhpv-5j76-m56h No CVE MODERATE 0.0 PATH_TRAVERSAL→FILE_READ JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The original code did not properly sanitize or validate the input path for file reads, allowing attackers to access local files through a crafted input.
GHSA-jwrq-8g5x-5fhm No CVE MODERATE 0.0 MISSING_AUTHZ→RESOURCE JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not properly handle authorization for queue batches, potentially allowing unauthorized access to resources.
GHSA-qmwg-qprg-3j38 No CVE MODERATE 0.0 SSRF→INTERNAL_ACCESS JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not properly validate or sanitize the URL before navigating to it, allowing an attacker to pivot into local CDP and regain file reads.
GHSA-rj2p-j66c-mgqh No CVE MODERATE 0.0 SSRF→INTERNAL_ACCESS JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not properly handle SSRF policy failures against the CDP endpoint.
GHSA-xq94-r468-qwgj No CVE MODERATE 0.0 SSRF→INTERNAL_ACCESS JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not properly validate the hostname of the CDP endpoint, allowing DNS rebinding attacks.
GHSA-xmj9-7625-f634 No CVE MODERATE 0.0 TIMING_SIDE_CHANNEL→TOKEN_LEAK Java
Package
dev.dsf:dsf-bpe-server · datasharingframework/dsf
Root cause
The code does not properly handle the timing of OIDC provider discovery and JWKS resource requests, which could allow an attacker to perform a timing side-channel attack.
GHSA-xp4f-g2cm-rhg7 No CVE MODERATE 0.0 UNCLASSIFIED PHP
Package
pocketmine/pocketmine-mp · pmmp/PocketMine-MP
Root cause
The code was logging potentially sensitive data without proper sanitization or truncation.
GHSA-3m9m-24vh-39wx No CVE MODERATE 0.0 SSRF→INTERNAL_ACCESS PHP
Package
craftcms/cms · craftcms/cms
Root cause
The application allowed asset uploads via a URL without properly validating the scheme of the provided URL. This enabled an attacker to specify arbitrary schemes like `gopher://`, `file://`, or `ftp://`, which could be used to make requests to internal resources or local files.
GHSA-5879-4fmr-xwf2 No CVE MODERATE 0.0 PATH_TRAVERSAL→FILE_DELETE PHP
Package
wwbn/avideo · WWBN/AVideo
Root cause
The code did not properly sanitize the input for file deletion, allowing attackers to traverse directories and potentially delete arbitrary files on the server.
GHSA-8q5w-mmxf-48jg No CVE MODERATE 0.0 UNSANITIZED_INPUT→XSS Go
Package
github.com/siyuan-note/siyuan/kernel · siyuan-note/siyuan
Root cause
The `luteEngine` was not configured to sanitize input, allowing potential XSS attacks.
GHSA-95wr-3f2v-v2wh No CVE MODERATE 0.0 SSRF→INTERNAL_ACCESS PHP
Package
craftcms/cms · craftcms/cms
Root cause
The `actionResourceJs` endpoint in `AppController.php` directly fetched a URL provided by the user via a Guzzle client without sufficient validation or sanitization. This allowed an attacker to control the URL that the server would request, leading to a Server-Side Request Forgery.
GHSA-jq2f-59pj-p3m3 No CVE MODERATE 0.0 MISSING_AUTHZ→RESOURCE PHP
Package
craftcms/cms · craftcms/cms
Root cause
The application was missing an authorization check in the `actionSavePermissions` and `_saveUserGroups` methods. This allowed users who did not have the necessary permissions to modify user groups or permissions to still trigger these actions.
GHSA-m7r8-6q9j-m2hc No CVE MODERATE 0.0 UNSANITIZED_INPUT→XSS PHP
Package
wwbn/avideo · WWBN/AVideo
Root cause
The original code did not properly sanitize the 'href' attribute of inline links, allowing attackers to inject malicious scripts.
GHSA-r4q5-vmmm-2653 No CVE MODERATE 0.0 OPEN_REDIRECT→PHISHING JavaScript
Package
follow-redirects · follow-redirects/follow-redirects
Root cause
The code did not properly sanitize HTTP headers before redirecting to a cross-domain target.
GHSA-2f7j-rp58-mr42 No CVE MODERATE 0.0 INFO_DISCLOSURE→DIRECTORY_LISTING JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The function `buildGatewaySnapshot` exposed sensitive configuration and state paths to non-admin clients without proper authorization checks.
GHSA-3q42-xmxv-9vfr No CVE MODERATE 0.0 MISSING_AUTHZ→RESOURCE JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The vulnerability existed because the code did not check if the caller had the required 'operator.admin' scope before allowing them to set admin-class talk voice config persistence.
GHSA-42mx-vp8m-j7qh No CVE MODERATE 0.0 PATH_TRAVERSAL→FILE_WRITE JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The `replaceDirectoryContents` function did not properly sanitize directory names, allowing attackers to traverse the filesystem and execute arbitrary code.
GHSA-4g5x-2jfc-xm98 No CVE MODERATE 0.0 DOS→RESOURCE_EXHAUSTION JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The original code did not limit the number of media downloads per message, which could lead to excessive disk usage.
GHSA-4p4f-fc8q-84m3 No CVE MODERATE 0.0 UNCLASSIFIED JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not normalize URLs for trust comparison, allowing attackers to bypass security checks by manipulating URL casing or fragments.
GHSA-846p-hgpv-vphc No CVE MODERATE 0.0 PATH_TRAVERSAL→FILE_READ JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not properly sanitize or validate the input path for local file reading, allowing attackers to read arbitrary files on the server.
GHSA-98ch-45wp-ch47 No CVE MODERATE 0.0 UNCLASSIFIED JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not properly validate or sanitize environment override keys, allowing attackers to bypass system.run approval binding.
GHSA-fh32-73r9-rgh5 No CVE MODERATE 0.0 SSRF→INTERNAL_ACCESS JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not properly sanitize the input host by removing trailing dots before checking if it was 'localhost'. This allowed attackers to bypass remote loopback protections.
GHSA-fwjq-xwfj-gv75 No CVE MODERATE 0.0 UNSANITIZED_INPUT→REGEX JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not properly sanitize or validate the `agentSessionKey` input before using it to determine session visibility.
GHSA-jj6q-rrrf-h66h No CVE MODERATE 0.0 TIMING_SIDE_CHANNEL→TOKEN_LEAK JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code used a vulnerable timing-safe string comparison function that leaked length information through timing.
GHSA-m34q-h93w-vg5x No CVE MODERATE 0.0 PATH_TRAVERSAL→FILE_DELETE JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not properly validate or sanitize the remote path input, allowing attackers to delete arbitrary remote directories when roots were mis-scoped.
GHSA-rxmx-g7hr-8mx4 No CVE MODERATE 0.0 UNCLASSIFIED JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The original code used a single key for deduplication that did not include the chat ID and sender ID, allowing reused message IDs in other chats or from other senders to collide.
GHSA-w6wx-jq6j-6mcj No CVE MODERATE 0.0 UNCLASSIFIED JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not properly handle the `dlx` command options, allowing for potential injection of malicious operands.
GHSA-wpc6-37g7-8q4w No CVE MODERATE 0.0 UNSANITIZED_INPUT→COMMAND JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not properly sanitize input options for shell wrapper scripts, allowing attackers to execute arbitrary commands through disqualifying script options.
GHSA-wwfp-w96m-c6x8 No CVE MODERATE 0.0 IDOR→DATA_ACCESS JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The pairing requests were not properly grouped by account ID before pruning, allowing an attacker to bypass the pending-request cap per channel.
GHSA-h39g-6x3c-7fq9 No CVE LOW 3.8 PATH_TRAVERSAL→FILE_READ C#
Package
Zio · xoofx/zio
Root cause
The code did not properly sanitize or validate the input path, allowing attackers to traverse directories and access files outside of the intended subfilesystem root.
GHSA-f9jp-856v-8642 No CVE LOW 3.7 UNCLASSIFIED PHP
Package
pocketmine/pocketmine-mp · pmmp/PocketMine-MP
Root cause
The code does not properly check if a player is connected before allowing them to interact with the game.
GHSA-88gm-j2wx-58h6 No CVE LOW 2.2 SSRF→INTERNAL_ACCESS JavaScript
Package
@astrojs/cloudflare · withastro/astro
Root cause
The application's image-binding-transform endpoint fetched remote images without explicitly controlling redirect behavior. This allowed an attacker to provide a URL that would redirect to an internal resource, effectively bypassing previous SSRF mitigations.
GHSA-j88v-2chj-qfwx No CVE LOW 0.0 UNSANITIZED_INPUT→SQL Go
Package
github.com/jackc/pgx · jackc/pgx
Root cause
The vulnerability stemmed from the SQL lexer's failure to correctly parse PostgreSQL dollar-quoted string literals. When sanitizing SQL queries, the lexer would incorrectly identify placeholders (e.g., $1, $2) within these dollar-quoted strings, leading to premature substitution and potential injection if an attacker could control parts of the query.
GHSA-xmgf-hq76-4vx2 No CVE LOW 0.0 BUFFER_OVERFLOW→HEAP RUST
Package
openssl · rust-openssl/rust-openssl
Root cause
The vulnerability existed because the `openssl` crate's PEM password callback trampoline did not validate the length returned by the user-provided callback. If the callback returned a length greater than the actual buffer size, it could lead to an out-of-bounds read when OpenSSL attempted to use this oversized length to derive the decryption key.
GHSA-7ccv-rp6m-rffr No CVE LOW 0.0 MISSING_VERIFICATION→SIGNATURE Go
Package
github.com/openbao/openbao · openbao/openbao
Root cause
The vulnerability existed because OpenBao's certificate authentication renewal process only checked the Subject Key ID (SKID) and Authority Key ID (AKID) of the client certificate for identity verification during token renewal. It did not store or verify the full raw certificate, allowing an attacker to renew a token using a different certificate as long as it shared the same SKID and AKID as the original, valid certificate.
GHSA-gc9r-867r-j85f No CVE LOW 0.0 MISSING_AUTHZ→RESOURCE JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The function `isFeedbackInvokeAuthorized` did not check the sender's authorization before processing an invoke request.
GHSA-r77c-2cmr-7p47 No CVE LOW 0.0 UNCLASSIFIED JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The patch adds a new field 'session' to the delivery payload but does not address how this session context is handled or sanitized.
GHSA-3g92-f9ch-qjcm No CVE LOW 0.0 WEAK_CRYPTO→HASH RUST
Package
p3-symmetric · Plonky3/Plonky3
Root cause
The sponge construction used to get a hash function from a cryptographic permutation is not collision resistant for inputs of different lengths.
GHSA-gj9q-8w99-mp8j No CVE LOW 0.0 RACE_CONDITION→TOCTOU JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not properly handle file access checks between the existence check and the actual read operation.
GHSA-fj52-5g4h-gmq8 No CVE LOW 0.0 SESSION_FIXATION→HIJACK Python
Package
pyload-ng · pyload/pyload
Root cause
The code did not invalidate user sessions after permission changes, allowing attackers to hijack sessions.
GHSA-pjjw-68hj-v9mw No CVE LOW 0.0 PATH_TRAVERSAL→FILE_DELETE Python
Package
uv · astral-sh/uv
Root cause
The code directly uses user input to delete files without proper validation or sanitization.
GHSA-x7mm-9vvv-64w8 No CVE LOW 0.0 UNCLASSIFIED JavaScript
Package
unhead · unjs/unhead
Root cause
The `streamKey` parameter was being directly injected into an inline script without any validation or sanitization.
GHSA-r758-8hxw-4845 No CVE LOW 0.0 UNSANITIZED_INPUT→XSS Python
Package
justhtml · EmilStenstrom/justhtml
Root cause
The parser did not properly sanitize HTML input, allowing for Cross-Site Scripting (XSS) attacks.
GHSA-767m-xrhc-fxm7 No CVE LOW 0.0 UNCLASSIFIED JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The `send` and `poll` handlers in `send.ts` did not check for proper authentication before allowing access to admin-class Telegram config and cron persistence.
GHSA-fqrj-m88p-qf3v No CVE LOW 0.0 UNCLASSIFIED JavaScript
Package
openclaw · openclaw/openclaw
Root cause
The code did not properly handle or sanitize error messages that could reveal sensitive information.