Skip to content

Instantly share code, notes, and snippets.

View alon710's full-sized avatar
💪

Alon Barad alon710

💪
View GitHub Profile
@alon710
alon710 / GHSA-C7W3-X93F-QMM8.md
Created March 27, 2026 00:40
GHSA-C7W3-X93F-QMM8: GHSA-C7W3-X93F-QMM8: SMTP Command Injection in Nodemailer via CRLF Sequences - CVE Security Report

GHSA-C7W3-X93F-QMM8: GHSA-C7W3-X93F-QMM8: SMTP Command Injection in Nodemailer via CRLF Sequences

CVSS Score: 9.8 Published: 2026-03-26 Full Report: https://cvereports.com/reports/GHSA-C7W3-X93F-QMM8

Summary

Nodemailer, a widely utilized Node.js package for email transmission, contains a critical input validation vulnerability. The software fails to sanitize the envelope.size parameter, permitting attackers to inject arbitrary SMTP commands via CRLF sequences. This flaw facilitates unauthorized email distribution, bypassing of application-level recipient controls, and internal SMTP reconnaissance.

TL;DR

@alon710
alon710 / GHSA-WCJX-V2WJ-XG87.md
Created March 26, 2026 23:10
GHSA-WCJX-V2WJ-XG87: GHSA-WCJX-V2WJ-XG87: Denial of Service via Uncontrolled Recursion in pyasn1 - CVE Security Report

GHSA-WCJX-V2WJ-XG87: GHSA-WCJX-V2WJ-XG87: Denial of Service via Uncontrolled Recursion in pyasn1

CVSS Score: 7.5 Published: 2026-03-26 Full Report: https://cvereports.com/reports/GHSA-WCJX-V2WJ-XG87

Summary

The c2cciutils package relies on the pyasn1 library for processing Abstract Syntax Notation One (ASN.1) data structures. Prior to version 0.6.3, the pyasn1 library contained a critical uncontrolled recursion flaw in its Basic Encoding Rules (BER) decoder, allowing remote attackers to cause a Denial of Service (DoS) via crafted, deeply nested payloads.

TL;DR

@alon710
alon710 / GHSA-9Q82-XGWF-VJ6H.md
Created March 26, 2026 22:10
GHSA-9Q82-XGWF-VJ6H: GHSA-9Q82-XGWF-VJ6H: XS-Search and CSRF Prevention Bypass in Apollo Server - CVE Security Report

GHSA-9Q82-XGWF-VJ6H: GHSA-9Q82-XGWF-VJ6H: XS-Search and CSRF Prevention Bypass in Apollo Server

CVSS Score: 7.5 Published: 2026-03-26 Full Report: https://cvereports.com/reports/GHSA-9Q82-XGWF-VJ6H

Summary

Apollo Server contains a vulnerability that allows for the bypass of its built-in XS-Search and read-only Cross-Site Request Forgery (CSRF) prevention mechanisms. This bypass is triggered by a non-spec-compliant browser behavior related to CORS preflight requests.

TL;DR

@alon710
alon710 / GHSA-PW7H-9G6P-C378.md
Created March 26, 2026 21:40
GHSA-PW7H-9G6P-C378: GHSA-pw7h-9g6p-c378: Authorization Bypass and Resource Exhaustion in OpenClaw Tlon Provider - CVE Security Report

GHSA-PW7H-9G6P-C378: GHSA-pw7h-9g6p-c378: Authorization Bypass and Resource Exhaustion in OpenClaw Tlon Provider

CVSS Score: 7.5 Published: 2026-03-26 Full Report: https://cvereports.com/reports/GHSA-PW7H-9G6P-C378

Summary

The OpenClaw Tlon provider extension contains two logic flaws leading to authorization bypass and uncontrolled resource consumption. A falsy evaluation of array lengths prevents the application of empty allowlists, while improper operation ordering allows unauthenticated users to trigger expensive citation processing.

TL;DR

@alon710
alon710 / GHSA-RM59-992W-X2MV.md
Created March 26, 2026 21:10
GHSA-RM59-992W-X2MV: GHSA-RM59-992W-X2MV: Unauthenticated Resource Exhaustion and DoS in OpenClaw Voice Webhooks - CVE Security Report

GHSA-RM59-992W-X2MV: GHSA-RM59-992W-X2MV: Unauthenticated Resource Exhaustion and DoS in OpenClaw Voice Webhooks

CVSS Score: 7.5 Published: 2026-03-26 Full Report: https://cvereports.com/reports/GHSA-RM59-992W-X2MV

Summary

OpenClaw versions prior to 2026.3.23 suffer from an unauthenticated resource exhaustion vulnerability in the voice call webhook component. An architectural flaw allowed untrusted, unauthenticated HTTP connections to consume excessive memory and connection pool resources, leading to a complete Denial of Service (DoS) condition.

TL;DR

@alon710
alon710 / GHSA-48VW-M3QC-WR99.md
Created March 26, 2026 20:40
GHSA-48VW-M3QC-WR99: GHSA-48VW-M3QC-WR99: Improper Privilege Management in OpenClaw Gateway Trusted-Proxy Sessions - CVE Security Report

GHSA-48VW-M3QC-WR99: GHSA-48VW-M3QC-WR99: Improper Privilege Management in OpenClaw Gateway Trusted-Proxy Sessions

CVSS Score: 9.8 Published: 2026-03-26 Full Report: https://cvereports.com/reports/GHSA-48VW-M3QC-WR99

Summary

The OpenClaw gateway contains a privilege escalation vulnerability in its WebSocket connection logic when configured for trusted-proxy authentication. Client sessions claiming to be the Control UI over a trusted proxy connection retain self-declared administrative scopes without requiring a bound cryptographic device identity. This flaw permits an attacker capable of routing requests through the proxy to attain full administrative access to the gateway.

TL;DR

@alon710
alon710 / GHSA-39PP-XP36-Q6MG.md
Created March 26, 2026 20:10
GHSA-39PP-XP36-Q6MG: GHSA-39pp-xp36-q6mg: Remote Code Execution via Environment Variable Injection in OpenClaw - CVE Security Report

GHSA-39PP-XP36-Q6MG: GHSA-39pp-xp36-q6mg: Remote Code Execution via Environment Variable Injection in OpenClaw

CVSS Score: 9.8 Published: 2026-03-26 Full Report: https://cvereports.com/reports/GHSA-39PP-XP36-Q6MG

Summary

OpenClaw versions prior to 2026.3.22 are vulnerable to Remote Code Execution (RCE) due to inconsistent sanitization of environment variable overrides between the Gateway and Node components. This architectural flaw allows attackers to inject shell-sensitive variables, resulting in arbitrary command execution on the host system.

TL;DR

@alon710
alon710 / GHSA-WQ58-2PVG-5H4F.md
Created March 26, 2026 19:10
GHSA-WQ58-2PVG-5H4F: GHSA-WQ58-2PVG-5H4F: Improper Authorization and Privilege Escalation in OpenClaw Gateway Agent RPC - CVE Security Report

GHSA-WQ58-2PVG-5H4F: GHSA-WQ58-2PVG-5H4F: Improper Authorization and Privilege Escalation in OpenClaw Gateway Agent RPC

CVSS Score: High Published: 2026-03-26 Full Report: https://cvereports.com/reports/GHSA-WQ58-2PVG-5H4F

Summary

The OpenClaw gateway contains an improper authorization vulnerability in the Agent RPC handler. Users with basic operator.write permissions can bypass scope restrictions to execute administrative session resets via in-band text commands, leading to targeted service disruption and state manipulation.

TL;DR

@alon710
alon710 / GHSA-2PV8-4C52-MF8J.md
Created March 26, 2026 17:10
GHSA-2PV8-4C52-MF8J: GHSA-2PV8-4C52-MF8J: Instance-Wide Data Breach via Auth Bypass and IDOR Chain in Vikunja - CVE Security Report

GHSA-2PV8-4C52-MF8J: GHSA-2PV8-4C52-MF8J: Instance-Wide Data Breach via Auth Bypass and IDOR Chain in Vikunja

CVSS Score: 8.1 Published: 2026-03-26 Full Report: https://cvereports.com/reports/GHSA-2PV8-4C52-MF8J

Summary

A critical vulnerability chain in the Vikunja task management platform allows unauthenticated or minimally authenticated attackers to perform an instance-wide data breach. By combining a link-share hash disclosure (CVE-2026-33680) with a task attachment IDOR (CVE-2026-33678), attackers can read or delete any file attachment on the system.

TL;DR

@alon710
alon710 / CVE-2026-32746.md
Created March 26, 2026 09:20
CVE-2026-32746: CVE-2026-32746: Pre-Authentication Remote Code Execution via BSS Overflow in GNU Inetutils telnetd - CVE Security Report

CVE-2026-32746: CVE-2026-32746: Pre-Authentication Remote Code Execution via BSS Overflow in GNU Inetutils telnetd

CVSS Score: 9.8 Published: 2026-03-13 Full Report: https://cvereports.com/reports/CVE-2026-32746

Summary

A 32-year-old pre-authentication buffer overflow vulnerability exists in the GNU Inetutils telnetd daemon. The flaw resides in the LINEMODE SLC suboption handler, allowing remote attackers to achieve arbitrary code execution as the root user by overflowing a fixed-size BSS buffer during the initial Telnet handshake.

TL;DR