This month's cases
GHSA advisories selected for the latest benchmark run.
OpenClaw: `fetchWithSsrFGuard` replays unsafe request bodies across cross-origin redirects
MinIO affected a DoS via Unbounded Memory Allocation in S3 Select CSV Parsing
OpenClaw: HGRCPATH, CARGO_BUILD_RUSTC_WRAPPER, RUSTC_WRAPPER, and MAKEFLAGS missing from exec env denylist — RCE via build tool env injection (GHSA-cm8v-2vh9-cxf3 class)
Duplicate Advisory: OpenClaw: `fetchWithSsrFGuard` replays unsafe request bodies across cross-origin redirects
Marimo: Pre-Auth Remote Code Execution via Terminal WebSocket Authentication Bypass
Axios HTTP/2 Session Cleanup State Corruption Vulnerability
lightrag-hku: JWT Algorithm Confusion Vulnerability
File Browser: Proxy auth auto-provisioned users inherit Execute permission and Commands
File Browser discloses text file content via /api/resources endpoint bypassing Perm.Download check
File Browser share links remain accessible after Share/Download permissions are revoked
File Browser has an access rule bypass via HasPrefix without trailing separator in path matching
Gotenberg has incomplete fix for ExifTool arbitrary file write: case-insensitive bypass and missing HardLink/SymLink tags
Gotenberg Vulnerable to ReDoS via extraHttpHeaders scope feature
OpenClaw: Android accepted cleartext remote gateway endpoints and sent stored credentials over ws://
OpenClaw: Shared-secret comparison call sites leaked length information through timing
OpenClaw: Zalo replay dedupe keys could suppress messages across chats or senders
OpenClaw: Trailing-dot localhost CDP hosts could bypass remote loopback protections
OpenClaw: pnpm dlx approvals did not bind local script operands
OpenClaw: Windows-compatible env override keys could bypass system.run approval binding
OpenClaw: Gateway hello snapshots exposed host config and state paths to non-admin clients
OpenClaw: Untrusted workspace channel shadows could execute during built-in channel setup
OpenClaw: Read-scoped identity-bearing HTTP clients could kill sessions via /sessions/:sessionKey/kill
OpenClaw: iOS A2UI bridge trusted generic local-network pages for agent.request dispatch
OpenClaw: QQ Bot structured payloads could read arbitrary local files
OpenClaw: OpenShell mirror mode could delete arbitrary remote directories when roots were mis-scoped