Skip to content

Commit 4d4cf09

Browse files
1 parent 9e7f546 commit 4d4cf09

5 files changed

Lines changed: 136 additions & 60 deletions

File tree

Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-6477-wvjj-47v6",
4+
"modified": "2026-05-07T16:44:07Z",
5+
"published": "2026-04-24T00:31:52Z",
6+
"withdrawn": "2026-05-07T16:44:07Z",
7+
"aliases": [],
8+
"summary": "Duplicate Advisory: OpenClaw: Zalo replay dedupe keys could suppress messages across chats or senders",
9+
"details": "### Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-rxmx-g7hr-8mx4. This link is maintained to preserve external references.\n\n### Original Description\nOpenClaw before 2026.4.2 contains an insufficient scope vulnerability in Zalo webhook replay dedupe keys that allows legitimate events from different conversations or senders to collide. Attackers can exploit weak deduplication scoping to cause silent message suppression and disrupt bot workflows across chat sessions.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
14+
},
15+
{
16+
"type": "CVSS_V4",
17+
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"
18+
}
19+
],
20+
"affected": [
21+
{
22+
"package": {
23+
"ecosystem": "npm",
24+
"name": "openclaw"
25+
},
26+
"ranges": [
27+
{
28+
"type": "ECOSYSTEM",
29+
"events": [
30+
{
31+
"introduced": "0"
32+
},
33+
{
34+
"fixed": "2026.4.2"
35+
}
36+
]
37+
}
38+
]
39+
}
40+
],
41+
"references": [
42+
{
43+
"type": "WEB",
44+
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rxmx-g7hr-8mx4"
45+
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41354"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://github.com/openclaw/openclaw/commit/ef7c553dd16ee579f1d1a363f5881a99726c1412"
53+
},
54+
{
55+
"type": "PACKAGE",
56+
"url": "https://github.com/openclaw/openclaw"
57+
},
58+
{
59+
"type": "WEB",
60+
"url": "https://www.vulncheck.com/advisories/openclaw-insufficient-scope-in-zalo-webhook-replay-dedupe-keys"
61+
}
62+
],
63+
"database_specific": {
64+
"cwe_ids": [
65+
"CWE-706"
66+
],
67+
"severity": "MODERATE",
68+
"github_reviewed": true,
69+
"github_reviewed_at": "2026-05-07T16:44:07Z",
70+
"nvd_published_at": "2026-04-23T22:16:42Z"
71+
}
72+
}

advisories/github-reviewed/2026/04/GHSA-rxmx-g7hr-8mx4/GHSA-rxmx-g7hr-8mx4.json

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rxmx-g7hr-8mx4",
4-
"modified": "2026-04-07T18:15:59Z",
4+
"modified": "2026-05-07T16:44:15Z",
55
"published": "2026-04-07T18:15:59Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2026-41354"
8+
],
79
"summary": "OpenClaw: Zalo replay dedupe keys could suppress messages across chats or senders",
810
"details": "## Summary\n\nBefore OpenClaw 2026.4.2, Zalo webhook replay dedupe keys were not scoped strongly enough across chat and sender dimensions. Legitimate events from different conversations or senders could collide and be dropped as duplicates.\n\n## Impact\n\nCross-conversation or cross-sender collisions could cause silent message suppression and break bot workflows. This was an availability issue in webhook event processing.\n\n## Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Affected versions: `<= 2026.4.1`\n- Patched versions: `>= 2026.4.2`\n- Latest published npm version: `2026.4.1`\n\n## Fix Commit(s)\n\n- `ef7c553dd16ee579f1d1a363f5881a99726c1412` — scope Zalo webhook replay dedupe across the missing event dimensions\n\n## Release Process Note\n\nThe fix is present on `main` and is staged for OpenClaw `2026.4.2`. Publish this advisory after the `2026.4.2` npm release is live.\n\nThanks @D0ub1e-D for reporting.",
911
"severity": [
@@ -41,13 +43,21 @@
4143
"type": "WEB",
4244
"url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rxmx-g7hr-8mx4"
4345
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-41354"
49+
},
4450
{
4551
"type": "WEB",
4652
"url": "https://github.com/openclaw/openclaw/commit/ef7c553dd16ee579f1d1a363f5881a99726c1412"
4753
},
4854
{
4955
"type": "PACKAGE",
5056
"url": "https://github.com/openclaw/openclaw"
57+
},
58+
{
59+
"type": "WEB",
60+
"url": "https://www.vulncheck.com/advisories/openclaw-insufficient-scope-in-zalo-webhook-replay-dedupe-keys"
5161
}
5262
],
5363
"database_specific": {

advisories/unreviewed/2026/05/GHSA-q57j-rwwx-7rwp/GHSA-q57j-rwwx-7rwp.json renamed to advisories/github-reviewed/2026/05/GHSA-q57j-rwwx-7rwp/GHSA-q57j-rwwx-7rwp.json

Lines changed: 26 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-q57j-rwwx-7rwp",
4-
"modified": "2026-05-01T21:31:20Z",
4+
"modified": "2026-05-07T16:45:30Z",
55
"published": "2026-05-01T18:31:24Z",
66
"aliases": [
77
"CVE-2026-42474"
88
],
9+
"summary": "MixPHP Framework has an SQL injection vulnerability via crafted `data` array",
910
"details": "SQL injection vulnerability in MixPHP Framework 2.x thru 2.2.17 via crafted `data` array to the data function in BuildHelper.php.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "mix/mix"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "2.0.0"
29+
},
30+
{
31+
"last_affected": "2.2.17"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -24,7 +45,7 @@
2445
"url": "https://gist.github.com/sgInnora/fa46386840fe978a30d7e53c458f2975"
2546
},
2647
{
27-
"type": "WEB",
48+
"type": "PACKAGE",
2849
"url": "https://github.com/mix-php/mix"
2950
},
3051
{
@@ -37,8 +58,8 @@
3758
"CWE-89"
3859
],
3960
"severity": "MODERATE",
40-
"github_reviewed": false,
41-
"github_reviewed_at": null,
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2026-05-07T16:45:30Z",
4263
"nvd_published_at": "2026-05-01T16:16:31Z"
4364
}
4465
}

advisories/unreviewed/2026/05/GHSA-vf35-8m4j-gm8v/GHSA-vf35-8m4j-gm8v.json renamed to advisories/github-reviewed/2026/05/GHSA-vf35-8m4j-gm8v/GHSA-vf35-8m4j-gm8v.json

Lines changed: 26 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vf35-8m4j-gm8v",
4-
"modified": "2026-05-01T21:31:20Z",
4+
"modified": "2026-05-07T16:44:56Z",
55
"published": "2026-05-01T18:31:24Z",
66
"aliases": [
77
"CVE-2026-42475"
88
],
9+
"summary": "MixPHP Framework has an SQL injection vulnerability",
910
"details": "SQL injection vulnerability in MixPHP Framework 2.x thru 2.2.17 via crafted `on` array to the joinOn function in BuildHelper.php.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "mix/mix"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "2.0.0"
29+
},
30+
{
31+
"last_affected": "2.2.17"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -24,7 +45,7 @@
2445
"url": "https://gist.github.com/sgInnora/fa46386840fe978a30d7e53c458f2975"
2546
},
2647
{
27-
"type": "WEB",
48+
"type": "PACKAGE",
2849
"url": "https://github.com/mix-php/mix"
2950
},
3051
{
@@ -37,8 +58,8 @@
3758
"CWE-89"
3859
],
3960
"severity": "MODERATE",
40-
"github_reviewed": false,
41-
"github_reviewed_at": null,
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2026-05-07T16:44:56Z",
4263
"nvd_published_at": "2026-05-01T16:16:31Z"
4364
}
4465
}

advisories/unreviewed/2026/04/GHSA-6477-wvjj-47v6/GHSA-6477-wvjj-47v6.json

Lines changed: 0 additions & 48 deletions
This file was deleted.

0 commit comments

Comments
 (0)