From 808b3d0b1d2f02b4fd16a10816646bf45bc81bb7 Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" <41898282+github-actions[bot]@users.noreply.github.com> Date: Sun, 26 Apr 2026 11:27:35 +0000 Subject: [PATCH] chore: CVE advisories - 1 new, 1 updated Automated update from NVD CVE feed. Keywords: Poll window: 2026-04-24T06:36:58Z to 2026-04-26T11:26:31.000Z --- advisories/feed.json | 38 +++++++++++++++++++- advisories/feed.json.sig | 2 +- skills/clawsec-feed/advisories/feed.json | 38 +++++++++++++++++++- skills/clawsec-feed/advisories/feed.json.sig | 2 +- 4 files changed, 76 insertions(+), 4 deletions(-) diff --git a/advisories/feed.json b/advisories/feed.json index 1e07949..ca0572d 100644 --- a/advisories/feed.json +++ b/advisories/feed.json @@ -1,8 +1,43 @@ { "version": "0.0.3", - "updated": "2026-04-24T06:36:58Z", + "updated": "2026-04-26T11:27:34Z", "description": "Community-driven security advisory feed for ClawSec. Automatically updated with OpenClaw-related CVEs from NVD and community-reported security incidents.", "advisories": [ + { + "id": "CVE-2026-6987", + "severity": "high", + "type": "unknown_cwe_74", + "nvd_category_id": "CWE-74", + "title": "A vulnerability was detected in PicoClaw up to 0.2.4. Impacted is an unknown function of the file /a...", + "description": "A vulnerability was detected in PicoClaw up to 0.2.4. Impacted is an unknown function of the file /api/gateway/restart of the component Web Launcher Management Plane. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The project was informed of the problem early through an issue report but has not responded yet.", + "affected": [ + "picoclaw@*" + ], + "platforms": [ + "picoclaw" + ], + "action": "Review and update affected components. See NVD for remediation details.", + "published": "2026-04-25T17:16:33.870", + "references": [ + "https://github.com/sipeed/picoclaw/issues/2307", + "https://vuldb.com/submit/796336", + "https://vuldb.com/vuln/359530" + ], + "cvss_score": 7.3, + "nvd_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6987", + "exploitability_score": "high", + "exploitability_rationale": "High CVSS score (7.3); remotely exploitable without authentication; RCE is critical in agent deployments", + "attack_vector_analysis": { + "is_network_accessible": true, + "requires_authentication": false, + "requires_user_interaction": false, + "complexity": "low" + }, + "exploit_detection": { + "exploit_available": false, + "exploit_sources": [] + } + }, { "id": "CVE-2026-41361", "severity": "high", @@ -1544,6 +1579,7 @@ "title": "OpenClaw before 2026.4.2 accepts non-loopback cleartext ws:// gateway endpoints and transmits stored...", "description": "OpenClaw before 2026.4.2 accepts non-loopback cleartext ws:// gateway endpoints and transmits stored gateway credentials over unencrypted connections. Attackers can forge discovery results or craft setup codes to redirect clients to malicious endpoints, disclosing plaintext gateway credentials.", "affected": [ + "cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*", "openclaw@*" ], "platforms": [ diff --git a/advisories/feed.json.sig b/advisories/feed.json.sig index 50daa00..9247946 100644 --- a/advisories/feed.json.sig +++ b/advisories/feed.json.sig @@ -1 +1 @@ -+Z70KufwopuC1dNv27kECozoNYQ5DsRDs5RdZpWOcxX8WAQJjQ/QjrRl0S2IdTuaXNtkuJsAhhsvr3/fYw+CBg== \ No newline at end of file +zaclKDqSMrrHjrkpYRjs6mZQ7tYTIJImkANj7N7G7QRFeXGSjqX1MfNJ3ulVaz8cHzPj4wkxVmZ0479cdB15DQ== \ No newline at end of file diff --git a/skills/clawsec-feed/advisories/feed.json b/skills/clawsec-feed/advisories/feed.json index 1e07949..ca0572d 100644 --- a/skills/clawsec-feed/advisories/feed.json +++ b/skills/clawsec-feed/advisories/feed.json @@ -1,8 +1,43 @@ { "version": "0.0.3", - "updated": "2026-04-24T06:36:58Z", + "updated": "2026-04-26T11:27:34Z", "description": "Community-driven security advisory feed for ClawSec. Automatically updated with OpenClaw-related CVEs from NVD and community-reported security incidents.", "advisories": [ + { + "id": "CVE-2026-6987", + "severity": "high", + "type": "unknown_cwe_74", + "nvd_category_id": "CWE-74", + "title": "A vulnerability was detected in PicoClaw up to 0.2.4. Impacted is an unknown function of the file /a...", + "description": "A vulnerability was detected in PicoClaw up to 0.2.4. Impacted is an unknown function of the file /api/gateway/restart of the component Web Launcher Management Plane. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The project was informed of the problem early through an issue report but has not responded yet.", + "affected": [ + "picoclaw@*" + ], + "platforms": [ + "picoclaw" + ], + "action": "Review and update affected components. See NVD for remediation details.", + "published": "2026-04-25T17:16:33.870", + "references": [ + "https://github.com/sipeed/picoclaw/issues/2307", + "https://vuldb.com/submit/796336", + "https://vuldb.com/vuln/359530" + ], + "cvss_score": 7.3, + "nvd_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-6987", + "exploitability_score": "high", + "exploitability_rationale": "High CVSS score (7.3); remotely exploitable without authentication; RCE is critical in agent deployments", + "attack_vector_analysis": { + "is_network_accessible": true, + "requires_authentication": false, + "requires_user_interaction": false, + "complexity": "low" + }, + "exploit_detection": { + "exploit_available": false, + "exploit_sources": [] + } + }, { "id": "CVE-2026-41361", "severity": "high", @@ -1544,6 +1579,7 @@ "title": "OpenClaw before 2026.4.2 accepts non-loopback cleartext ws:// gateway endpoints and transmits stored...", "description": "OpenClaw before 2026.4.2 accepts non-loopback cleartext ws:// gateway endpoints and transmits stored gateway credentials over unencrypted connections. Attackers can forge discovery results or craft setup codes to redirect clients to malicious endpoints, disclosing plaintext gateway credentials.", "affected": [ + "cpe:2.3:a:openclaw:openclaw:*:*:*:*:*:node.js:*:*", "openclaw@*" ], "platforms": [ diff --git a/skills/clawsec-feed/advisories/feed.json.sig b/skills/clawsec-feed/advisories/feed.json.sig index 50daa00..9247946 100644 --- a/skills/clawsec-feed/advisories/feed.json.sig +++ b/skills/clawsec-feed/advisories/feed.json.sig @@ -1 +1 @@ -+Z70KufwopuC1dNv27kECozoNYQ5DsRDs5RdZpWOcxX8WAQJjQ/QjrRl0S2IdTuaXNtkuJsAhhsvr3/fYw+CBg== \ No newline at end of file +zaclKDqSMrrHjrkpYRjs6mZQ7tYTIJImkANj7N7G7QRFeXGSjqX1MfNJ3ulVaz8cHzPj4wkxVmZ0479cdB15DQ== \ No newline at end of file