{
  "summary": {
    "generated_at_utc": "2026-04-03T20:20:40.442568+00:00",
    "generated_at_local": "2026-04-03T22:20:40.442577+02:00",
    "recency_days": 30,
    "totals": {
      "findings": 126,
      "p0": 26,
      "p1": 0,
      "p2": 8,
      "kev": 26,
      "epss_high": 11
    },
    "top_vendors": [
      [
        "npm",
        75
      ],
      [
        "go",
        10
      ],
      [
        "pip",
        7
      ],
      [
        "Apple",
        6
      ],
      [
        "composer",
        5
      ],
      [
        "Google",
        3
      ],
      [
        "TrueConf",
        1
      ],
      [
        "Citrix",
        1
      ],
      [
        "F5",
        1
      ],
      [
        "Aquasecurity",
        1
      ],
      [
        "Langflow",
        1
      ],
      [
        "Craft CMS",
        1
      ]
    ],
    "top_cwes": [
      [
        "CWE-863",
        13
      ],
      [
        "CWE-770",
        6
      ],
      [
        "CWE-416",
        5
      ],
      [
        "CWE-22",
        5
      ],
      [
        "CWE-200",
        4
      ],
      [
        "CWE-79",
        4
      ],
      [
        "CWE-862",
        4
      ],
      [
        "CWE-94",
        3
      ]
    ],
    "kev_meta": {
      "kev_total": 1557,
      "kev_recent": 6
    },
    "vulnx_meta": {
      "vulnx_enabled": false,
      "sections": {},
      "errors": []
    },
    "osv_meta": {
      "osv_total": 0,
      "by_ecosystem": {
        "Maven": 0,
        "PyPI": 0,
        "Go": 0,
        "npm": 0,
        "Rust": 0,
        "RubyGems": 0,
        "NuGet": 0,
        "Linux": 0
      }
    },
    "ghsa_meta": {
      "ghsa_total": 100
    },
    "source_status": [
      {
        "name": "CISA KEV",
        "ok": true,
        "latency_s": 0.1,
        "error": null
      },
      {
        "name": "OSV.dev",
        "ok": true,
        "latency_s": 0.68,
        "error": null
      },
      {
        "name": "GHSA",
        "ok": true,
        "latency_s": 0.96,
        "error": null
      },
      {
        "name": "NVD",
        "ok": true,
        "latency_s": 6.67,
        "error": null,
        "hits_bulk": 9108,
        "hits_fallback": 0,
        "cache_used": 9203
      },
      {
        "name": "EPSS",
        "ok": true,
        "latency_s": 0.17,
        "error": null,
        "mode": "live"
      },
      {
        "name": "VULNX",
        "ok": false,
        "latency_s": null,
        "error": "vulnx not found in PATH"
      },
      {
        "name": "Ransomware.live",
        "ok": true,
        "latency_s": 0.73,
        "error": null
      },
      {
        "name": "Exploit-DB",
        "ok": true,
        "latency_s": 5.2,
        "error": null
      },
      {
        "name": "AlienVault OTX",
        "ok": false,
        "latency_s": null,
        "error": "403 Client Error: Forbidden for url: https://otx.alienvault.com/api/v1/pulses/activity?limit=40&page=1"
      },
      {
        "name": "GreyNoise",
        "ok": true,
        "latency_s": null,
        "error": "No GREYNOISE_API_KEY — skipped"
      }
    ],
    "errors": [],
    "trends_7d": [
      {
        "p0": 11,
        "p1": 14,
        "kev": 25,
        "epss_high": 9,
        "count": 125,
        "ts_local": "2026-04-02T15:06:06.757358+02:00"
      },
      {
        "p0": 13,
        "p1": 12,
        "kev": 25,
        "epss_high": 11,
        "count": 125,
        "ts_local": "2026-04-02T15:57:35.818965+02:00"
      },
      {
        "p0": 13,
        "p1": 12,
        "kev": 25,
        "epss_high": 11,
        "count": 125,
        "ts_local": "2026-04-02T16:07:10.828908+02:00"
      },
      {
        "p0": 13,
        "p1": 12,
        "kev": 25,
        "epss_high": 11,
        "ransomware": 0,
        "itw": 0,
        "count": 125,
        "ts_local": "2026-04-02T18:33:13.335153+02:00"
      },
      {
        "p0": 25,
        "p1": 0,
        "kev": 25,
        "epss_high": 11,
        "ransomware": 26,
        "itw": 26,
        "count": 125,
        "ts_local": "2026-04-02T18:50:10.699125+02:00"
      },
      {
        "p0": 27,
        "p1": 0,
        "kev": 26,
        "epss_high": 11,
        "ransomware": 30,
        "itw": 30,
        "count": 126,
        "ts_local": "2026-04-02T23:10:24.166227+02:00"
      },
      {
        "p0": 27,
        "p1": 0,
        "kev": 26,
        "epss_high": 11,
        "ransomware": 31,
        "itw": 31,
        "count": 126,
        "ts_local": "2026-04-02T23:29:57.935938+02:00"
      },
      {
        "p0": 245,
        "p1": 0,
        "kev": 244,
        "epss_high": 134,
        "ransomware": 241,
        "itw": 252,
        "count": 350,
        "ts_local": "2026-04-02T23:37:11.589376+02:00"
      },
      {
        "p0": 245,
        "p1": 0,
        "kev": 244,
        "epss_high": 134,
        "ransomware": 241,
        "itw": 252,
        "count": 350,
        "ts_local": "2026-04-03T00:12:50.794509+02:00"
      },
      {
        "p0": 322,
        "p1": 0,
        "kev": 319,
        "epss_high": 199,
        "ransomware": 275,
        "itw": 329,
        "count": 427,
        "ts_local": "2026-04-03T00:28:17.055076+02:00"
      },
      {
        "p0": 104,
        "p1": 0,
        "kev": 101,
        "epss_high": 76,
        "ransomware": 65,
        "itw": 108,
        "count": 203,
        "ts_local": "2026-04-03T00:33:42.468687+02:00"
      },
      {
        "p0": 109,
        "p1": 0,
        "kev": 106,
        "epss_high": 76,
        "ransomware": 68,
        "itw": 113,
        "count": 209,
        "ts_local": "2026-04-03T00:40:34.165645+02:00"
      },
      {
        "p0": 27,
        "p1": 0,
        "kev": 26,
        "epss_high": 11,
        "ransomware": 31,
        "itw": 31,
        "count": 126,
        "ts_local": "2026-04-03T00:51:54.977522+02:00"
      },
      {
        "p0": 26,
        "p1": 0,
        "kev": 26,
        "epss_high": 11,
        "ransomware": 30,
        "itw": 30,
        "count": 126,
        "ts_local": "2026-04-03T22:02:40.753951+02:00"
      },
      {
        "p0": 26,
        "p1": 0,
        "kev": 26,
        "epss_high": 11,
        "ransomware": 30,
        "itw": 30,
        "count": 126,
        "ts_local": "2026-04-03T22:05:57.786307+02:00"
      },
      {
        "p0": 26,
        "p1": 0,
        "kev": 26,
        "epss_high": 11,
        "ransomware": 30,
        "itw": 30,
        "count": 126,
        "ts_local": "2026-04-03T22:10:52.823981+02:00"
      },
      {
        "p0": 26,
        "p1": 0,
        "kev": 26,
        "epss_high": 11,
        "ransomware": 30,
        "itw": 30,
        "count": 126,
        "ts_local": "2026-04-03T22:16:14.160313+02:00"
      },
      {
        "p0": 26,
        "p1": 0,
        "kev": 26,
        "epss_high": 11,
        "ransomware": 30,
        "itw": 30,
        "count": 126,
        "ts_local": "2026-04-03T22:20:40.441937+02:00"
      }
    ]
  },
  "findings": [
    {
      "cve": "CVE-2026-3502",
      "title": "TrueConf Client Download of Code Without Integrity Check Vulnerability",
      "description": "TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.",
      "severity": "",
      "cvss": 7.8,
      "cvss_vector": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L",
      "epss": 9e-05,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "TrueConf",
      "product": "Client",
      "cwe": "CWE-494",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-04-02",
      "updated": "2026-04-02",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://trueconf.com/blog/update/trueconf-8-5 ; https://trueconf.com/downloads/windows.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-3502"
      ],
      "nvd_enriched": true,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 151.81,
      "priority_band": "P0",
      "score_breakdown": "CVSS 7.8×6=46.8 | EPSS 0.000×120=0.0 | KEV+45 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2026-5281",
      "title": "Google Dawn Use-After-Free Vulnerability",
      "description": "Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)",
      "severity": "",
      "cvss": 8.8,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "epss": 0.00038,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Google",
      "product": "Dawn",
      "cwe": "CWE-416",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-04-01",
      "updated": "2026-04-01",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: This vulnerability affects an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https://chromereleases.googleb"
      ],
      "nvd_enriched": true,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 162.85,
      "priority_band": "P0",
      "score_breakdown": "CVSS 8.8×6=52.8 | EPSS 0.000×120=0.0 | KEV+45 | CWE_HIGH+5 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2026-3055",
      "title": "Citrix NetScaler Out-of-Bounds Read Vulnerability",
      "description": "Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread",
      "severity": "",
      "cvss": 9.8,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "epss": 0.44301,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Citrix",
      "product": "NetScaler",
      "cwe": "CWE-125",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-30",
      "updated": "2026-03-30",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300&articleURL=NetScaler_ADC_and_NetScaler_Gateway_Security_Bulletin_for_CVE_2026_3055_and_CVE_2026_4368 ; https://nvd.nist.gov/vuln/detail/CVE"
      ],
      "nvd_enriched": true,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 221.96,
      "priority_band": "P0",
      "score_breakdown": "CVSS 9.8×6=58.8 | EPSS 0.443×120=53.2 | KEV+45 | CWE_HIGH+5 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2025-53521",
      "title": "F5 BIG-IP Stack-Based Buffer Overflow Vulnerability",
      "description": "",
      "severity": "",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.41408,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "F5",
      "product": "BIG-IP",
      "cwe": "",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-27",
      "updated": "2026-03-27",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: Please adhere to F5’s guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible F5 products affected by this vulnerability. For more information please see: http"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 154.69,
      "priority_band": "P0",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.414×120=49.7 | KEV+45 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2026-33634",
      "title": "Aquasecurity Trivy Embedded Malicious Code Vulnerability",
      "description": "Trivy is a security scanner. On March 19, 2026, a threat actor used compromised credentials to publish a malicious Trivy v0.69.4 release, force-push 76 of 77 version tags in `aquasecurity/trivy-action` to credential-stealing malware, and replace all 7 tags in `aquasecurity/setup-trivy` with malicious commits. This incident is a continuation of the supply chain attack that began in late February 2026. Following the initial disclosure on March 1, credential rotation was performed but was not atomic (not all credentials were revoked simultaneously). The attacker could have use a valid token to ex",
      "severity": "",
      "cvss": 8.8,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "epss": 0.21153,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Aquasecurity",
      "product": "Trivy",
      "cwe": "CWE-506",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-26",
      "updated": "2026-03-26",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: This vulnerability involves a supply‑chain compromise in a product that may be used across multiple products and environments. Additional vendor‑provided guidance must be followed to ensure full remediation. For more inf"
      ],
      "nvd_enriched": true,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 183.18,
      "priority_band": "P0",
      "score_breakdown": "CVSS 8.8×6=52.8 | EPSS 0.212×120=25.4 | KEV+45 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2026-33017",
      "title": "Langflow Code Injection Vulnerability",
      "description": "Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows without requiring authentication. When the optional data parameter is supplied, the endpoint uses attacker-controlled flow data (containing arbitrary Python code in node definitions) instead of the stored flow data from the database. This code is passed to exec() with zero sandboxing, resulting in unauthenticated remote code execution. This is distinct from CVE-2025-3248, which fixed /api/v1/validate/co",
      "severity": "",
      "cvss": 9.8,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "epss": 0.05654,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Langflow",
      "product": "Langflow",
      "cwe": "CWE-94",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-25",
      "updated": "2026-03-25",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx ; https://nvd.nist.gov/vuln/detail/CVE-2026-33017"
      ],
      "nvd_enriched": true,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 175.58,
      "priority_band": "P0",
      "score_breakdown": "CVSS 9.8×6=58.8 | EPSS 0.057×120=6.8 | KEV+45 | CWE_HIGH+5 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2025-32432",
      "title": "Craft CMS Code Injection Vulnerability",
      "description": "",
      "severity": "",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.87671,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Craft CMS",
      "product": "Craft CMS",
      "cwe": "",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-20",
      "updated": "2026-03-20",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://craftcms.com/knowledge-base/craft-cms-cve-2025-32432 ; https://github.com/craftcms/cms/security/advisories/GHSA-f3gw-9ww9-jmc3 ; https://nvd.nist.gov/vuln/detail/CVE-2025-32432"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 210.21,
      "priority_band": "P0",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.877×120=105.2 | KEV+45 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2025-54068",
      "title": "Laravel Livewire Code Injection Vulnerability",
      "description": "",
      "severity": "",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.48851,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Laravel",
      "product": "Livewire",
      "cwe": "",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-20",
      "updated": "2026-03-20",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://github.com/livewire/livewire/security/advisories/GHSA-29cq-5w36-x7w3 ; https://github.com/livewire/livewire/commit/ef04be759da41b14d2d129e670533180a44987dc ; https://nvd.nist.gov/vuln/detail/CVE-2025-54068"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 163.62,
      "priority_band": "P0",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.489×120=58.6 | KEV+45 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2025-43510",
      "title": "Apple Multiple Products Improper Locking Vulnerability",
      "description": "",
      "severity": "",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.00462,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Apple",
      "product": "Multiple Products",
      "cwe": "",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-20",
      "updated": "2026-03-20",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://support.apple.com/en-us/125632 ; https://support.apple.com/en-us/125633 ; https://support.apple.com/en-us/125634 ; https://support.apple.com/en-us/125635 ; https://support.apple.com/en-us/125636 ; https://support"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 105.55,
      "priority_band": "P0",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.005×120=0.6 | KEV+45 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2025-43520",
      "title": "Apple Multiple Products Classic Buffer Overflow Vulnerability",
      "description": "",
      "severity": "",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.00475,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Apple",
      "product": "Multiple Products",
      "cwe": "",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-20",
      "updated": "2026-03-20",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://support.apple.com/en-us/125632 ; https://support.apple.com/en-us/125633 ; https://support.apple.com/en-us/125634 ; https://support.apple.com/en-us/125635 ; https://support.apple.com/en-us/125636 ; https://support"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 105.57,
      "priority_band": "P0",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.005×120=0.6 | KEV+45 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2025-31277",
      "title": "Apple Multiple Products Buffer Overflow Vulnerability",
      "description": "",
      "severity": "",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.00192,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Apple",
      "product": "Multiple Products",
      "cwe": "",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-20",
      "updated": "2026-03-20",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://support.apple.com/en-us/124147 ; https://support.apple.com/en-us/124149 ; https://support.apple.com/en-us/124152 ; https://support.apple.com/en-us/124153 ; https://support.apple.com/en-us/124155 ; https://nvd.nis"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 105.23,
      "priority_band": "P0",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.002×120=0.2 | KEV+45 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2026-20131",
      "title": "Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability",
      "description": "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root&nbsp;on an affected device.\r\n\r\nThis vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java object to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the device and elevate privileges to root.\r\nNote: If t",
      "severity": "",
      "cvss": 10.0,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
      "epss": 0.00595,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Cisco",
      "product": "Secure Firewall Management Center (FMC)",
      "cwe": "CWE-502",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-19",
      "updated": "2026-03-19",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh ; https://nvd.nist.gov/vuln/detail/CVE-2026-20131"
      ],
      "nvd_enriched": true,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 170.71,
      "priority_band": "P0",
      "score_breakdown": "CVSS 10.0×6=60.0 | EPSS 0.006×120=0.7 | KEV+45 | CWE_HIGH+5 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2025-66376",
      "title": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability",
      "description": "",
      "severity": "",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.10014,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Synacor",
      "product": "Zimbra Collaboration Suite (ZCS)",
      "cwe": "",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-18",
      "updated": "2026-03-18",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories ; https://nvd.nist.gov/vuln/detail/CVE-2025-66376"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 117.02,
      "priority_band": "P0",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.100×120=12.0 | KEV+45 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2026-20963",
      "title": "Microsoft SharePoint Deserialization of Untrusted Data Vulnerability",
      "description": "",
      "severity": "",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.06169,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Microsoft",
      "product": "SharePoint",
      "cwe": "",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-18",
      "updated": "2026-03-18",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20963 ; https://nvd.nist.gov/vuln/detail/CVE-2026-20963"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 112.4,
      "priority_band": "P0",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.062×120=7.4 | KEV+45 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2025-47813",
      "title": "Wing FTP Server Information Disclosure Vulnerability",
      "description": "",
      "severity": "",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.20423,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Wing FTP Server",
      "product": "Wing FTP Server",
      "cwe": "",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-16",
      "updated": "2026-03-16",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://www.wftpserver.com/serverhistory.htm ; https://nvd.nist.gov/vuln/detail/CVE-2025-47813"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 129.51,
      "priority_band": "P0",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.204×120=24.5 | KEV+45 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2026-3910",
      "title": "Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability",
      "description": "Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
      "severity": "",
      "cvss": 8.8,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "epss": 0.01488,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Google",
      "product": "Chromium V8",
      "cwe": "CWE-94",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-13",
      "updated": "2026-03-13",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_12.html ; https://nvd.nist.gov/vuln/detail/CVE-2026-3910"
      ],
      "nvd_enriched": true,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 164.59,
      "priority_band": "P0",
      "score_breakdown": "CVSS 8.8×6=52.8 | EPSS 0.015×120=1.8 | KEV+45 | CWE_HIGH+5 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2026-3909",
      "title": "Google Skia Out-of-Bounds Write Vulnerability",
      "description": "Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)",
      "severity": "",
      "cvss": 8.8,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "epss": 0.00516,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Google",
      "product": "Skia",
      "cwe": "CWE-787",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-13",
      "updated": "2026-03-13",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, pleas"
      ],
      "nvd_enriched": true,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 163.42,
      "priority_band": "P0",
      "score_breakdown": "CVSS 8.8×6=52.8 | EPSS 0.005×120=0.6 | KEV+45 | CWE_HIGH+5 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2025-68613",
      "title": "n8n Improper Control of Dynamically-Managed Code Resources Vulnerability",
      "description": "",
      "severity": "",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.79157,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "n8n",
      "product": "n8n",
      "cwe": "",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-11",
      "updated": "2026-03-11",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp ; https://nvd.nist.gov/vuln/detail/CVE-2025-68613"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 199.99,
      "priority_band": "P0",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.792×120=95.0 | KEV+45 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2021-22054",
      "title": "Omnissa Workspace ONE Server-Side Request Forgery",
      "description": "",
      "severity": "",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.93848,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Omnissa",
      "product": "Workspace One UEM",
      "cwe": "",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-09",
      "updated": "2026-03-09",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://web.archive.org/web/20211222154335/https://www.vmware.com/security/advisories/VMSA-2021-0029.html ; https://nvd.nist.gov/vuln/detail/CVE-2021-22054"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 217.62,
      "priority_band": "P0",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.938×120=112.6 | KEV+45 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2025-26399",
      "title": "SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability",
      "description": "",
      "severity": "",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.28241,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "SolarWinds",
      "product": "Web Help Desk",
      "cwe": "",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-09",
      "updated": "2026-03-09",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://www.solarwinds.com/trust-center/security-advisories/cve-2025-26399 ; https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_12-8-7-hotfix-1_release_notes.htm ; https://nvd.nist.gov/v"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 138.89,
      "priority_band": "P0",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.282×120=33.9 | KEV+45 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2026-1603",
      "title": "Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability",
      "description": "",
      "severity": "",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.65389,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Ivanti",
      "product": " Endpoint Manager (EPM)",
      "cwe": "",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-09",
      "updated": "2026-03-09",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2026-1603"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 183.47,
      "priority_band": "P0",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.654×120=78.5 | KEV+45 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2017-7921",
      "title": "Hikvision Multiple Products Improper Authentication Vulnerability",
      "description": "",
      "severity": "",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.9423,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Hikvision",
      "product": "Multiple Products",
      "cwe": "",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-05",
      "updated": "2026-03-05",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/ ; https://nvd.nist.gov/vuln/detail/CVE-2017-7921"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 218.08,
      "priority_band": "P0",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.942×120=113.1 | KEV+45 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2021-22681",
      "title": "Rockwell Multiple Products Insufficient Protected Credentials Vulnerability",
      "description": "",
      "severity": "",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.12905,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Rockwell",
      "product": "Multiple Products",
      "cwe": "",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-05",
      "updated": "2026-03-05",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://support.rockwellautomation.com/app/answers/answer_view/a_id/1130301/~/cve-2021-22681%3A-authentication-bypass-vulnerability-found-in-logix-controllers- ; https://www.cisa.gov/news-events/ics-advisories/icsa-21-05"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 120.49,
      "priority_band": "P0",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.129×120=15.5 | KEV+45 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2023-43000",
      "title": "Apple Multiple products Use-After-Free Vulnerability",
      "description": "",
      "severity": "",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.00095,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Apple",
      "product": "Multiple Products",
      "cwe": "",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-05",
      "updated": "2026-03-05",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://support.apple.com/en-us/120324 ; https://support.apple.com/en-us/120331 ; https://support.apple.com/en-us/120338 ; https://nvd.nist.gov/vuln/detail/CVE-2023-43000"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 105.11,
      "priority_band": "P0",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.001×120=0.1 | KEV+45 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2021-30952",
      "title": "Apple Multiple Products Integer Overflow or Wraparound Vulnerability",
      "description": "",
      "severity": "",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.01279,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Apple",
      "product": "Multiple Products",
      "cwe": "",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-05",
      "updated": "2026-03-05",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://support.apple.com/en-us/HT212975 ; https://support.apple.com/en-us/HT212976 ; https://support.apple.com/en-us/HT212978 ; https://support.apple.com/en-us/HT212980 ; https://support.apple.com/en-us/HT212982 ; https"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 106.53,
      "priority_band": "P0",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.013×120=1.5 | KEV+45 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "CVE-2023-41974",
      "title": "Apple iOS and iPadOS Use-After-Free Vulnerability",
      "description": "",
      "severity": "",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.00187,
      "kev": true,
      "remote": false,
      "poc": false,
      "vendor": "Apple",
      "product": "iOS and iPadOS",
      "cwe": "",
      "cwe_name": "",
      "source": "CISA-KEV",
      "sources": [
        "CISA-KEV"
      ],
      "published": "2026-03-05",
      "updated": "2026-03-05",
      "refs": [
        "Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
        "Notes: https://support.apple.com/en-us/HT213938 ; https://support.apple.com/kb/HT213938 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41974"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Conti",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 105.22,
      "priority_band": "P0",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.002×120=0.2 | KEV+45 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "GHSA-rm5c-4rmf-vvhw",
      "title": "OpenClaw: Sandbox file operations use check-then-act, bypassing fd-based TOCTOU defenses",
      "description": "## Summary\nSandbox file operations use check-then-act, bypassing fd-based TOCTOU defenses\n\n## Current Maintainer Triage\n- Status: narrow\n- Normalized severity: medium\n- Assessment: Released workspace-only apply_patch remove and mkdir operations were still check-then-act, but the draft overstates scope by bundling broader edit paths; keep it open but narrow it to the actual sandbox-workspace mutati",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-367",
      "cwe_name": "Time-of-check Time-of-use (TOCTOU) Race Condition",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:01:57Z",
      "updated": "2026-04-03T20:16:02Z",
      "refs": [
        "https://github.com/advisories/GHSA-rm5c-4rmf-vvhw"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2024-24762",
      "title": "python-multipart vulnerable to Content-Type Header ReDoS",
      "description": "### Summary\n\nWhen using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options.\n\nAn attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more re",
      "severity": "high",
      "cvss": 7.5,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "epss": 0.03422,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "pip",
      "product": "python-multipart",
      "cwe": "CWE-400",
      "cwe_name": "Uncontrolled Resource Consumption",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2024-02-12T17:28:12Z",
      "updated": "2026-04-03T19:13:44Z",
      "refs": [
        "https://github.com/advisories/GHSA-2jv5-9r88-3w3p"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 49.11,
      "priority_band": "P3",
      "score_breakdown": "CVSS 7.5×6=45.0 | EPSS 0.034×120=4.1"
    },
    {
      "cve": "CVE-2025-68153",
      "title": "Juju has a resource poisoning vulnerability",
      "description": "### Summary\nAny authenticated user, machine or controller under a Juju controller can modify the resources of an application within the entire controller.\n\nThis one is very straightforward to just read in the code:\n\n**Step 1:**\nThe authorisation mechanism for the resource handler is defined [here](https://github.com/juju/juju/blob/1a8d84ec114c2e4f9921e30081e5a5549f7cbfc4/apiserver/internal/handler",
      "severity": "high",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "go",
      "product": "github.com/juju/juju",
      "cwe": "CWE-863",
      "cwe_name": "Incorrect Authorization",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T18:29:54Z",
      "updated": "2026-04-03T18:29:55Z",
      "refs": [
        "https://github.com/advisories/GHSA-245v-p8fj-vwm2"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2025-68152",
      "title": "Juju: Read All Controller Logs From Compromised Workload",
      "description": "### Summary\nIt is possible that a compromised workload machine under a Juju controller can read any log file for any entity in any model at any level.\n\nThere is a debug log endpoint in the API server that allows streaming of logs off of the controller. To access this endpoint you must be authentication and either be a machine agent, controller agent, controller admin or have model read permission.",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "go",
      "product": "github.com/juju/juju",
      "cwe": "CWE-863",
      "cwe_name": "Incorrect Authorization",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T18:18:38Z",
      "updated": "2026-04-03T18:18:39Z",
      "refs": [
        "https://github.com/advisories/GHSA-j6f6-jp3p-53mw"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-34215",
      "title": "Parse Server exposes auth data via verify password endpoint",
      "description": "### Impact\n\nThe verify password endpoint returns unsanitized authentication data, including MFA TOTP secrets, recovery codes, and OAuth access tokens. An attacker who knows a user's password can extract the MFA secret to generate valid MFA codes, defeating multi-factor authentication protection.\n\n### Patches\n\nThe verify password endpoint now sanitizes authentication data through auth adapter hooks",
      "severity": "high",
      "cvss": 6.5,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
      "epss": 0.00047,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "parse-server",
      "cwe": "CWE-200",
      "cwe_name": "Exposure of Sensitive Information to an Unauthorized Actor",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-03-29T15:14:03Z",
      "updated": "2026-04-03T16:14:41Z",
      "refs": [
        "https://github.com/advisories/GHSA-wp76-gg32-8258"
      ],
      "nvd_enriched": true,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 39.06,
      "priority_band": "P3",
      "score_breakdown": "CVSS 6.5×6=39.0 | EPSS 0.000×120=0.1"
    },
    {
      "cve": "GHSA-3c7f-5hgj-h279",
      "title": "n8n has XSS in Chat Trigger Node through Custom CSS",
      "description": "## Impact\nAn authenticated user with permission to create or modify workflows could inject malicious JavaScript into the Custom CSS field of the Chat Trigger node. Due to a misconfiguration in the `sanitize-html` library, the sanitization could be bypassed, resulting in stored XSS on the public chat page. Any user visiting the chat URL would be affected.\n\n## Patches\nThe issue has been fixed in n8n",
      "severity": "medium",
      "cvss": 5.4,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "n8n",
      "cwe": "CWE-79",
      "cwe_name": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-03-27T18:06:49Z",
      "updated": "2026-04-03T16:07:54Z",
      "refs": [
        "https://github.com/advisories/GHSA-3c7f-5hgj-h279"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 37.4,
      "priority_band": "P3",
      "score_breakdown": "CVSS 5.4×6=32.4 | EPSS 0.000×120=0.0 | CWE_HIGH+5"
    },
    {
      "cve": "CVE-2026-34756",
      "title": "vLLM: Unauthenticated OOM Denial of Service via Unbounded `n` Parameter in OpenAI API Server",
      "description": "### Summary\nA Denial of Service vulnerability exists in the vLLM OpenAI-compatible API server. Due to the lack of an upper bound validation on the `n` parameter in the `ChatCompletionRequest` and `CompletionRequest` Pydantic models, an unauthenticated attacker can send a single HTTP request with an astronomically large `n` value. This completely blocks the Python `asyncio` event loop and causes im",
      "severity": "medium",
      "cvss": 6.5,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "pip",
      "product": "vllm",
      "cwe": "CWE-770",
      "cwe_name": "Allocation of Resources Without Limits or Throttling",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T15:35:48Z",
      "updated": "2026-04-03T15:35:50Z",
      "refs": [
        "https://github.com/advisories/GHSA-3mwp-wvh9-7528"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 39.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 6.5×6=39.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-34450",
      "title": "Claude SDK for Python has Insecure Default File Permissions in Local Filesystem Memory Tool",
      "description": "The local filesystem memory tool in the Anthropic Python SDK created memory files with mode 0o666, leaving them world-readable on systems with a standard umask and world-writable in environments with a permissive umask such as many Docker base images. A local attacker on a shared host could read persisted agent state, and in containerized deployments could modify memory files to influence subseque",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.00012,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "pip",
      "product": "anthropic",
      "cwe": "CWE-276",
      "cwe_name": "Incorrect Default Permissions",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-01T21:15:30Z",
      "updated": "2026-04-03T08:44:32Z",
      "refs": [
        "https://github.com/advisories/GHSA-q5f5-3gjm-7mfm"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.01,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-35393",
      "title": "goshs: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in goshs POST multipart upload",
      "description": "### Summary\n* POST multipart upload directory not sanitized | `httpserver/updown.go:71-174`\n\nThis finding affect the default configuration, no flags or authentication required.\n\n### Details\n\n**File:** `httpserver/updown.go:71-174`\n**Trigger:** `POST /<path>/upload` (server.go:49-51 checks `HasSuffix(r.URL.Path, \"/upload\")`)\n\nThe filename is sanitized (slashes stripped, line 105-106), but the targe",
      "severity": "critical",
      "cvss": 9.8,
      "cvss_vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "go",
      "product": "github.com/patrickhener/goshs",
      "cwe": "CWE-22",
      "cwe_name": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T04:08:20Z",
      "updated": "2026-04-03T04:08:21Z",
      "refs": [
        "https://github.com/advisories/GHSA-jg56-wf8x-qrv5"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 63.8,
      "priority_band": "P2",
      "score_breakdown": "CVSS 9.8×6=58.8 | EPSS 0.000×120=0.0 | CWE_HIGH+5"
    },
    {
      "cve": "CVE-2026-35392",
      "title": "goshs: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in goshs PUT Upload",
      "description": "### Summary\n* PUT upload has no path sanitization | `httpserver/updown.go:20-69`\n\nThis finding affects the default configuration, no flags or authentication required.\n\n### Details\n\n**File:** `httpserver/updown.go:20-69`\n**Trigger:** `PUT /<path>` (server.go:57-59 routes directly to `put()`)\n\nThe handler uses `req.URL.Path` raw to build the save path. No `filepath.Clean`, no `..` check, no webroot ",
      "severity": "critical",
      "cvss": 9.8,
      "cvss_vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "go",
      "product": "github.com/patrickhener/goshs",
      "cwe": "CWE-22",
      "cwe_name": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T04:07:55Z",
      "updated": "2026-04-03T04:07:55Z",
      "refs": [
        "https://github.com/advisories/GHSA-g8mv-vp7j-qp64"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 63.8,
      "priority_band": "P2",
      "score_breakdown": "CVSS 9.8×6=58.8 | EPSS 0.000×120=0.0 | CWE_HIGH+5"
    },
    {
      "cve": "CVE-2026-35039",
      "title": "fast-jwt: Cache Confusion via cacheKeyBuilder Collisions Can Return Claims From a Different Token (Identity/Authorization Mixup)",
      "description": "## Impact\n\nSetting up a custom cacheKeyBuilder method which does not properly create unique keys for different tokens can lead to cache collisions. This could cause tokens to be mis-identified during the verification process leading to:\n\n- Valid tokens returning claims from different valid tokens\n- Users being mis-identified as other users based on the wrong token\n\nThis could result in:\n- User imp",
      "severity": "critical",
      "cvss": 9.1,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "fast-jwt",
      "cwe": "CWE-345",
      "cwe_name": "Insufficient Verification of Data Authenticity",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T04:07:09Z",
      "updated": "2026-04-03T04:07:10Z",
      "refs": [
        "https://github.com/advisories/GHSA-rp9m-7r4c-75qg"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 54.6,
      "priority_band": "P3",
      "score_breakdown": "CVSS 9.1×6=54.6 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-35038",
      "title": "Signal K Server: Arbitrary Prototype Read via `from` Field Bypass",
      "description": "## Summary \n\nThe /signalk/v1/applicationData/... JSON-patch endpoint allows users to modify stored application data. To prevent Prototype Pollution, the developers implemented an isPrototypePollutionPath guard. However, this guard only checks the path property of incoming JSON-patch objects. It completely fails to check the from property. Because JSON-patch operations like copy and move extract da",
      "severity": "low",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.00084,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "signalk-server",
      "cwe": "CWE-20",
      "cwe_name": "Improper Input Validation",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T04:04:22Z",
      "updated": "2026-04-03T04:04:23Z",
      "refs": [
        "https://github.com/advisories/GHSA-qh3j-mrg8-f234"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 5.1,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.001×120=0.1 | CWE_HIGH+5"
    },
    {
      "cve": "CVE-2026-34992",
      "title": "Antrea has Missing Encryption of Sensitive Data",
      "description": "### Impact\nThis is a missing encryption vulnerability (CWE-311) affecting inter-Node Pod traffic. In Antrea clusters configured for dual-stack networking with IPsec encryption enabled (`trafficEncryptionMode: ipsec`), Antrea fails to apply encryption for IPv6 Pod traffic.\n\nWhile the IPv4 traffic is correctly encrypted via ESP (Encapsulating Security Payload), traffic using IPv6 is transmitted in p",
      "severity": "high",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "go",
      "product": "antrea.io/antrea",
      "cwe": "CWE-311",
      "cwe_name": "Missing Encryption of Sensitive Data",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T04:02:47Z",
      "updated": "2026-04-03T04:02:48Z",
      "refs": [
        "https://github.com/advisories/GHSA-qcmw-8mm4-4p28"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-34989",
      "title": "CI4MS: Profile & User Management Full Account Takeover for All-Roles & Privilege-Escalation via Stored DOM XSS",
      "description": "## Summary\n### **Vulnerability 1: Stored DOM XSS via Profile Name Update (Persistent Payload Injection)**\n- Stored Cross-Site Scripting via Unsanitized User Name in Profile Management\n\n### Description\nThe application fails to properly sanitize user-controlled input when users update their profile name (e.g., full name / username). An attacker can inject a malicious JavaScript payload into their pr",
      "severity": "critical",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "composer",
      "product": "ci4-cms-erp/ci4ms",
      "cwe": "CWE-79",
      "cwe_name": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T04:00:57Z",
      "updated": "2026-04-03T04:01:00Z",
      "refs": [
        "https://github.com/advisories/GHSA-vr2g-rhm5-q4jr"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 5.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0 | CWE_HIGH+5"
    },
    {
      "cve": "CVE-2026-35175",
      "title": "Ajenti has an authorization bypass during custom package installation",
      "description": "### Impact\n\nAn authenticated user (using the `auth_users` plugin authentication method) could install a custom package even if this user is not superuser.\n\n### Patches\n\nThis is fixed in the version 2.2.15. Users should upgrade to this version as soon as possible.",
      "severity": "high",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "pip",
      "product": "ajenti-panel",
      "cwe": "CWE-862",
      "cwe_name": "Missing Authorization",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:57:43Z",
      "updated": "2026-04-03T03:57:44Z",
      "refs": [
        "https://github.com/advisories/GHSA-73jv-44c3-j5p2"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-35171",
      "title": "Kedro has Arbitrary Code Execution via Malicious Logging Configuration",
      "description": "### Impact\n\nThis is a **critical Remote Code Execution (RCE)** vulnerability caused by unsafe use of `logging.config.dictConfig()` with user-controlled input.\n\nKedro allows the logging configuration file path to be set via the `KEDRO_LOGGING_CONFIG` environment variable and loads it without validation. The logging configuration schema supports the special `()` key, which enables arbitrary callable",
      "severity": "critical",
      "cvss": 9.8,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "pip",
      "product": "kedro",
      "cwe": "CWE-94",
      "cwe_name": "Improper Control of Generation of Code ('Code Injection')",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:48:48Z",
      "updated": "2026-04-03T03:48:49Z",
      "refs": [
        "https://github.com/advisories/GHSA-9cqf-439c-j96r"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 63.8,
      "priority_band": "P2",
      "score_breakdown": "CVSS 9.8×6=58.8 | EPSS 0.000×120=0.0 | CWE_HIGH+5"
    },
    {
      "cve": "CVE-2026-35168",
      "title": "OpenSTAManager: SQL Injection via Aggiornamenti Module",
      "description": "## Description\n\nThe Aggiornamenti (Updates) module in OpenSTAManager <= 2.10.1 contains a database conflict resolution feature (`op=risolvi-conflitti-database`) that accepts a JSON array of SQL statements via POST and executes them directly against the database without any validation, allowlist, or sanitization.\n\nAn authenticated attacker with access to the Aggiornamenti module can execute arbitra",
      "severity": "high",
      "cvss": 8.8,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "epss": 0.00061,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "composer",
      "product": "devcode-it/openstamanager",
      "cwe": "CWE-89",
      "cwe_name": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:47:37Z",
      "updated": "2026-04-03T03:47:38Z",
      "refs": [
        "https://github.com/advisories/GHSA-2fr7-cc4f-wh98"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 57.87,
      "priority_band": "P3",
      "score_breakdown": "CVSS 8.8×6=52.8 | EPSS 0.001×120=0.1 | CWE_HIGH+5"
    },
    {
      "cve": "CVE-2026-35167",
      "title": "Kedro: Path Traversal in versioned dataset loading via unsanitized version string",
      "description": "### Impact\nThe `_get_versioned_path()` method in kedro/io/core.py constructs filesystem paths by directly interpolating user-supplied version strings without sanitization. Because version strings are used as path components, traversal sequences such as ../ are preserved and can escape the intended versioned dataset directory.\nThis is reachable through multiple entry points: `catalog.load(..., vers",
      "severity": "high",
      "cvss": 7.1,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "pip",
      "product": "kedro",
      "cwe": "CWE-22",
      "cwe_name": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:46:48Z",
      "updated": "2026-04-03T03:46:48Z",
      "refs": [
        "https://github.com/advisories/GHSA-6326-w46w-ppjw"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 47.6,
      "priority_band": "P3",
      "score_breakdown": "CVSS 7.1×6=42.6 | EPSS 0.000×120=0.0 | CWE_HIGH+5"
    },
    {
      "cve": "GHSA-cjmm-f4jc-qw8r",
      "title": "DOMPurify ADD_ATTR predicate skips URI validation",
      "description": "## Summary\nDOMPurify allows `ADD_ATTR` to be provided as a predicate function via `EXTRA_ELEMENT_HANDLING.attributeCheck`. When the predicate returns `true`, `_isValidAttribute` short-circuits the attribute check before URI-safe validation runs. An attacker who supplies a predicate that accepts specific attribute/tag combinations can then sanitize input such as `<a href=\"javascript:alert(document.",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "dompurify",
      "cwe": "CWE-183",
      "cwe_name": "Permissive List of Allowed Inputs",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:46:07Z",
      "updated": "2026-04-03T03:46:08Z",
      "refs": [
        "https://github.com/advisories/GHSA-cjmm-f4jc-qw8r"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-cj63-jhhr-wcxv",
      "title": "DOMPurify USE_PROFILES prototype pollution allows event handlers",
      "description": "## Summary\nWhen `USE_PROFILES` is enabled, DOMPurify rebuilds `ALLOWED_ATTR` as a plain array before populating it with the requested allowlists. Because the sanitizer still looks up attributes via `ALLOWED_ATTR[lcName]`, any `Array.prototype` property that is polluted also counts as an allowlisted attribute. An attacker who can set `Array.prototype.onclick = true` (or a runtime already subject to",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "dompurify",
      "cwe": "CWE-1321",
      "cwe_name": "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:45:08Z",
      "updated": "2026-04-03T03:45:08Z",
      "refs": [
        "https://github.com/advisories/GHSA-cj63-jhhr-wcxv"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-35052",
      "title": "D-Tale: Remote Code Execution through redis/shelf storage",
      "description": "### Impact\nUsers hosting D-Tale publicly while using a redis or shelf storage layer could be vulnerable to remote code execution allowing attackers to run malicious code on the server.\n\n### Patches\nUsers should upgrade to version 3.22.0.\n\n### Workarounds\nThere are no workarounds for versions < 3.22.0",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "pip",
      "product": "dtale",
      "cwe": "CWE-79",
      "cwe_name": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:44:39Z",
      "updated": "2026-04-03T03:44:43Z",
      "refs": [
        "https://github.com/advisories/GHSA-436g-fhfc-9g5w"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 5.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0 | CWE_HIGH+5"
    },
    {
      "cve": "GHSA-ghc5-95c2-vwcv",
      "title": "Auth0 Symfony SDK has Insufficient Entropy in Cookie Encryption",
      "description": "### Impact\nIn applications built with the Auth0 PHP SDK, cookies are encrypted with insufficient entropy, which may result in threat actors brute-forcing the encryption key and forging session cookies.\n\n### Am I Affected?\nConsumers are affected if their application meets the following preconditions:\n- It uses the Auth0 Symfony SDK, versions between 5.0.0 and 5.7.0\n- Auth0 Symfony SDK using the Aut",
      "severity": "high",
      "cvss": 8.2,
      "cvss_vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "composer",
      "product": "auth0/symfony",
      "cwe": "CWE-331",
      "cwe_name": "Insufficient Entropy",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:44:13Z",
      "updated": "2026-04-03T03:44:13Z",
      "refs": [
        "https://github.com/advisories/GHSA-ghc5-95c2-vwcv"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 49.2,
      "priority_band": "P3",
      "score_breakdown": "CVSS 8.2×6=49.2 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-vfpx-q664-h93m",
      "title": "Auth0 WordPress Plugin has Insufficient Entropy in Cookie Encryption",
      "description": "### Impact\nIn applications built with the Auth0 PHP SDK, cookies are encrypted with insufficient entropy, which may result in threat actors brute-forcing the encryption key and forging session cookies.\n\n### Am I Affected?\nConsumers are affected if their application meets the following preconditions:\n- It is using the Auth0 WordPress Plugin, versions between 5.0.0-BETA0 and 5.5.0\n- Auth0 WordPress ",
      "severity": "high",
      "cvss": 8.2,
      "cvss_vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "composer",
      "product": "auth0/wordpress",
      "cwe": "CWE-331",
      "cwe_name": "Insufficient Entropy",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:43:13Z",
      "updated": "2026-04-03T03:43:13Z",
      "refs": [
        "https://github.com/advisories/GHSA-vfpx-q664-h93m"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 49.2,
      "priority_band": "P3",
      "score_breakdown": "CVSS 8.2×6=49.2 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-fmg6-246m-9g2v",
      "title": "Auth0 laravel-auth0 SDK has Insufficient Entropy in Cookie Encryption",
      "description": "### Impact\nIn applications built with the Auth0 PHP SDK, cookies are encrypted with insufficient entropy, which may result in threat actors brute-forcing the encryption key and forging session cookies.\n\n### Am I Affected?\nYou are affected if you meet the following preconditions:\n\n- Applications using laravel-auth0 SDK, versions between 7.0.0 and 7.20.0\n- Laravel-auth0 SDK using the Auth0-PHP SDK v",
      "severity": "high",
      "cvss": 8.2,
      "cvss_vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "composer",
      "product": "auth0/login",
      "cwe": "CWE-331",
      "cwe_name": "Insufficient Entropy",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:41:04Z",
      "updated": "2026-04-03T03:41:07Z",
      "refs": [
        "https://github.com/advisories/GHSA-fmg6-246m-9g2v"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 49.2,
      "priority_band": "P3",
      "score_breakdown": "CVSS 8.2×6=49.2 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-32145",
      "title": "wisp has Allocation of Resources Without Limits or Throttling",
      "description": "### Summary\nA multipart form parsing bug allows any unauthenticated user to bypass configured request size limits and trigger a denial of service by exhausting server memory or disk.\n\n### Details\nThe issue is in the multipart parsing logic, specifically in `multipart_body` and `multipart_headers`.\n\nWhen parsing multipart data, the implementation distinguishes between:\n- chunks where a boundary is ",
      "severity": "high",
      "cvss": 0.0,
      "cvss_vector": "",
      "epss": 0.00015,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "erlang",
      "product": "wisp",
      "cwe": "CWE-770",
      "cwe_name": "Allocation of Resources Without Limits or Throttling",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:40:30Z",
      "updated": "2026-04-03T03:40:32Z",
      "refs": [
        "https://github.com/advisories/GHSA-8645-p2v4-73r2"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.02,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-28815",
      "title": "Swift Crypto: X-Wing HPKE Decapsulation Accepts Malformed Ciphertext Length",
      "description": "### Summary\n\nThe X-Wing decapsulation path accepts attacker-controlled encapsulated ciphertext bytes without enforcing the required fixed ciphertext length. The decapsulation call is forwarded into a C API, which expects a compile-time fixed-size ciphertext buffer of 1120 bytes. This creates an FFI memory-safety boundary issue when a shorter `Data` value is passed in, because the C code may read b",
      "severity": "high",
      "cvss": 7.5,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "epss": 0.00017,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "swift",
      "product": "swift-crypto",
      "cwe": "CWE-787",
      "cwe_name": "Out-of-bounds Write",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:39:38Z",
      "updated": "2026-04-03T03:39:42Z",
      "refs": [
        "https://github.com/advisories/GHSA-9m44-rr2w-ppp7"
      ],
      "nvd_enriched": true,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 50.02,
      "priority_band": "P3",
      "score_breakdown": "CVSS 7.5×6=45.0 | EPSS 0.000×120=0.0 | CWE_HIGH+5"
    },
    {
      "cve": "CVE-2026-35037",
      "title": "Ech0: Unauthenticated SSRF in GetWebsiteTitle allows access to internal services and cloud metadata",
      "description": "## Summary\n\nThe `GET /api/website/title` endpoint accepts an arbitrary URL via the `website_url` query parameter and makes a server-side HTTP request to it without any validation of the target host or IP address. The endpoint requires no authentication. An attacker can use this to reach internal network services, cloud metadata endpoints (169.254.169.254), and localhost-bound services, with partia",
      "severity": "high",
      "cvss": 7.2,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "go",
      "product": "github.com/lin-snow/ech0",
      "cwe": "CWE-918",
      "cwe_name": "Server-Side Request Forgery (SSRF)",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:33:00Z",
      "updated": "2026-04-03T03:33:01Z",
      "refs": [
        "https://github.com/advisories/GHSA-cqgf-f4x7-g6wc"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 48.2,
      "priority_band": "P3",
      "score_breakdown": "CVSS 7.2×6=43.2 | EPSS 0.000×120=0.0 | CWE_HIGH+5"
    },
    {
      "cve": "CVE-2026-35036",
      "title": "Ech0 has Unauthenticated Server-Side Request Forgery in Website Preview Feature",
      "description": "### Summary\n\nEch0 implements **link preview** (editor fetches a page title) through **`GET /api/website/title`**. That is **legitimate product behavior**, but the implementation is **unsafe**: the route is **unauthenticated**, accepts a **fully attacker-controlled URL**, performs a **server-side GET**, reads the **entire response body** into memory (`io.ReadAll`). There is **no** host allowlist, *",
      "severity": "high",
      "cvss": 7.5,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "go",
      "product": "github.com/lin-snow/ech0",
      "cwe": "CWE-918",
      "cwe_name": "Server-Side Request Forgery (SSRF)",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:30:53Z",
      "updated": "2026-04-03T03:30:55Z",
      "refs": [
        "https://github.com/advisories/GHSA-wc4h-2348-jc3p"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 50.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 7.5×6=45.0 | EPSS 0.000×120=0.0 | CWE_HIGH+5"
    },
    {
      "cve": "GHSA-xg6x-h9c9-2m83",
      "title": "Better Auth Has Two-Factor Authentication Bypass via Premature Session Caching (session.cookieCache)",
      "description": "### Summary\n\nUnder certain configurations, sessions may be considered valid before two-factor authentication (2FA) is fully completed. This can allow access to authenticated routes without verifying the second factor.\n\n---\n\n### Description\n\nWhen two-factor authentication is enabled, the authentication flow correctly identifies users who require additional verification and defers full authenticatio",
      "severity": "critical",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "better-auth",
      "cwe": "CWE-288",
      "cwe_name": "Authentication Bypass Using an Alternate Path or Channel",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:29:59Z",
      "updated": "2026-04-03T03:29:59Z",
      "refs": [
        "https://github.com/advisories/GHSA-xg6x-h9c9-2m83"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-34986",
      "title": "Go JOSE Panics in JWE decryption",
      "description": "### Impact\n\nDecrypting a JSON Web Encryption (JWE) object will panic if the `alg` field indicates a key wrapping algorithm ([one ending in `KW`](https://pkg.go.dev/github.com/go-jose/go-jose/v4#pkg-constants), with the exception of `A128GCMKW`, `A192GCMKW`, and `A256GCMKW`) and the `encrypted_key` field is empty. The panic happens when `cipher.KeyUnwrap()` in `key_wrap.go` attempts to allocate a s",
      "severity": "high",
      "cvss": 7.5,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "go",
      "product": "github.com/go-jose/go-jose/v4",
      "cwe": "CWE-248",
      "cwe_name": "Uncaught Exception",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:28:56Z",
      "updated": "2026-04-03T03:28:59Z",
      "refs": [
        "https://github.com/advisories/GHSA-78h2-9frx-2jm8"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 45.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 7.5×6=45.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-x2m8-53h4-6hch",
      "title": "OpenClaw: Discord voice ingress authorization can be bypassed via channel, name, and stale-role validation gaps",
      "description": "## Summary\nDiscord voice ingress authorization can be bypassed via channel, name, and stale-role validation gaps\n\n## Current Maintainer Triage\n- Status: narrow\n- Assessment: Real in shipped v2026.3.28 Discord voice ingress, but impact is channel/member allowlist bypass rather than a broader critical auth break and mainline fix is unreleased.\n\n## Affected Packages / Versions\n- Package: `openclaw` (",
      "severity": "low",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-862",
      "cwe_name": "Missing Authorization",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:27:38Z",
      "updated": "2026-04-03T03:27:39Z",
      "refs": [
        "https://github.com/advisories/GHSA-x2m8-53h4-6hch"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-6336-qqw9-v6x6",
      "title": "OpenClaw: Discord Component Interaction Misclassifies Group DM as Direct Message",
      "description": "## Summary\nDiscord Component Interaction Misclassifies Group DM as Direct Message\n\n## Current Maintainer Triage\n- Status: narrow\n- Assessment: Real on shipped v2026.3.24 component-interaction routing/auth in extensions/discord/src/monitor/agent-components-helpers.ts, but impact is limited to Group DM policy or session misclassification.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-863",
      "cwe_name": "Incorrect Authorization",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:26:51Z",
      "updated": "2026-04-03T03:26:51Z",
      "refs": [
        "https://github.com/advisories/GHSA-6336-qqw9-v6x6"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-9f4w-67g7-mqwv",
      "title": "OpenClaw: Endpoint persists after trust decline, leaking gateway credentials",
      "description": "## Summary\nRemote onboarding preserves attacker-discovered endpoint after trust decline, routing gateway credentials to it\n\n## Current Maintainer Triage\n- Status: narrow\n- Normalized severity: medium\n- Assessment: Real shipped onboarding trust-decline bug because the declined discovered URL survived into the manual prompt, but operator acceptance of that prefill is still required, so medium.\n\n## A",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-670",
      "cwe_name": "Always-Incorrect Control Flow Implementation",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:26:14Z",
      "updated": "2026-04-03T03:26:15Z",
      "refs": [
        "https://github.com/advisories/GHSA-9f4w-67g7-mqwv"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-3xv9-89fm-7h4r",
      "title": "OpenClaw: diffs viewer misclassifies proxied remote requests as loopback when `allowRemoteViewer` is disabled",
      "description": "## Summary\ndiffs viewer misclassifies proxied remote requests as loopback when `allowRemoteViewer` is disabled\n\n## Current Maintainer Triage\n- Assessment: Shipped v2026.3.28 misclassified proxied diff-viewer requests as local loopback in some cases, a real but low-severity access-control flaw.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Latest published npm version: `2026.3.31`\n",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-348",
      "cwe_name": "Use of Less Trusted Source",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:24:25Z",
      "updated": "2026-04-03T03:24:25Z",
      "refs": [
        "https://github.com/advisories/GHSA-3xv9-89fm-7h4r"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-rvvf-6vh3-9j43",
      "title": "OpenClaw: Discord Slash Commands Bypass Group DM Channel Allowlist",
      "description": "## Summary\nDiscord Slash Commands Bypass Group DM Channel Allowlist\n\n## Current Maintainer Triage\n- Status: narrow\n- Normalized severity: moderate\n- Assessment: v2026.3.28 native Discord slash and autocomplete paths still skip the group-DM allowlist, but impact is limited to already-authorized Discord users bypassing a channel restriction rather than crossing a stronger trust boundary.\n\n## Affecte",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-863",
      "cwe_name": "Incorrect Authorization",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:23:36Z",
      "updated": "2026-04-03T03:23:38Z",
      "refs": [
        "https://github.com/advisories/GHSA-rvvf-6vh3-9j43"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-q9w8-cf67-r238",
      "title": "OpenClaw: macOS Tailnet DNS Spoofing & Credential Exfiltration",
      "description": "## Summary\nmacOS Wide-Area Discovery Accepts Arbitrary Tailnet Peer as DNS Authority and Exfiltrates Operator Credentials\n\n## Current Maintainer Triage\n- Status: narrow\n- Normalized severity: medium\n- Assessment: Real shipped macOS discovery steering bug, but exploitation needs same-tailnet position, a CA-trusted endpoint, and user selection, so medium not high.\n\n## Affected Packages / Versions\n- ",
      "severity": "high",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-346",
      "cwe_name": "Origin Validation Error",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:22:32Z",
      "updated": "2026-04-03T03:22:33Z",
      "refs": [
        "https://github.com/advisories/GHSA-q9w8-cf67-r238"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-f693-58pc-2gfr",
      "title": "OpenClaw: Telegram legacy allowFrom migration fans default-account trust into all named accounts",
      "description": "## Summary\nTelegram legacy allowFrom migration fans default-account trust into all named accounts\n\n## Current Maintainer Triage\n- Normalized severity: low\n- Assessment: Shipped v2026.3.28 Telegram migration fans legacy default-account allowFrom trust into named accounts, which is an in-scope auth-boundary bug and low fits.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Latest publi",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-732",
      "cwe_name": "Incorrect Permission Assignment for Critical Resource",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:20:58Z",
      "updated": "2026-04-03T03:20:59Z",
      "refs": [
        "https://github.com/advisories/GHSA-f693-58pc-2gfr"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-3pm9-5j7m-59vc",
      "title": "OpenClaw: Tlon Startup Migration Rehydrates Empty-Array Revocations From File Config",
      "description": "## Summary\nTlon Startup Migration Rehydrates Empty-Array Revocations From File Config\n\n## Current Maintainer Triage\n- Normalized severity: low\n- Assessment: v2026.3.28 startup migration still treats empty-array settings as missing and can rehydrate revoked Tlon config from file state after restart.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Latest published npm version: `2026.3",
      "severity": "low",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-436",
      "cwe_name": "Interpretation Conflict",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:20:16Z",
      "updated": "2026-04-03T03:20:17Z",
      "refs": [
        "https://github.com/advisories/GHSA-3pm9-5j7m-59vc"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-gg9v-mgcp-v6m7",
      "title": "OpenClaw: Unbound bootstrap setup codes allow privilege escalation during pairing",
      "description": "## Summary\nBootstrap setup codes were not bound to the intended device role and scopes, allowing first-use privilege escalation during pairing.\n\n## Current Maintainer Triage\n- Status: open\n- Normalized severity: high\n- Assessment: Real first-use bootstrap privilege-escalation bug fixed and shipped in v2026.3.22+, so keep open for publication with current severity.\n\n## Affected Packages / Versions\n",
      "severity": "high",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-269",
      "cwe_name": "Improper Privilege Management",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:19:33Z",
      "updated": "2026-04-03T03:19:33Z",
      "refs": [
        "https://github.com/advisories/GHSA-gg9v-mgcp-v6m7"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-h5hg-h7rr-gpf3",
      "title": "OpenClaw: Node browser proxy `allowProfiles` bypass through persistent profile mutation and runtime profile selection",
      "description": "## Summary\nNode browser proxy `allowProfiles` bypass through persistent profile mutation and runtime profile selection\n\n## Current Maintainer Triage\n- Normalized severity: high\n- Assessment: Real released allowProfiles bypass through profile mutation and runtime profile selection, fixed and shipped in v2026.3.22+, so keep open for publish rather than close.\n\n## Affected Packages / Versions\n- Packa",
      "severity": "high",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-863",
      "cwe_name": "Incorrect Authorization",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:18:10Z",
      "updated": "2026-04-03T03:18:11Z",
      "refs": [
        "https://github.com/advisories/GHSA-h5hg-h7rr-gpf3"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-cqgw-44wg-44rf",
      "title": "OpenClaw: Discord voice manager bypasses channel-level member access allowlist",
      "description": "## Summary\nDiscord voice manager bypasses channel-level member access allowlist\n\n## Current Maintainer Triage\n- Normalized severity: medium\n- Assessment: v2026.3.28 still accepts Discord voice ingress before channel allowlist authorization, and main-only gating means this remains a real shipped access-control bug.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Latest published npm ",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-863",
      "cwe_name": "Incorrect Authorization",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:17:22Z",
      "updated": "2026-04-03T03:17:23Z",
      "refs": [
        "https://github.com/advisories/GHSA-cqgw-44wg-44rf"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-m6fx-m8hc-572m",
      "title": "OpenClaw: Telegram audio preflight transcription enables resource consumption by unauthorized senders",
      "description": "## Summary\nTelegram audio preflight transcription enables resource consumption by unauthorized senders\n\n## Current Maintainer Triage\n- Status: narrow\n- Normalized severity: medium\n- Assessment: v2026.3.28 still lets unauthorized Telegram group senders trigger audio preflight before allowlist enforcement, but the real impact is resource or billing burn rather than direct data exposure or host compr",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-770",
      "cwe_name": "Allocation of Resources Without Limits or Throttling",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:15:56Z",
      "updated": "2026-04-03T03:15:56Z",
      "refs": [
        "https://github.com/advisories/GHSA-m6fx-m8hc-572m"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-gjm7-hw8f-73rq",
      "title": "OpenClaw: Paired node escalates to gateway RCE via unrestricted node.event agent dispatch",
      "description": "## Summary\nPaired node escalates to gateway RCE via unrestricted node.event agent dispatch\n\n## Current Maintainer Triage\n- Status: narrow\n- Normalized severity: high\n- Assessment: v2026.3.28 still lets paired role=node clients drive node.event agent.request into broader gateway-side tool access than node RPCs, but critical is overstated because a trusted paired node foothold is already required.\n\n",
      "severity": "high",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-863",
      "cwe_name": "Incorrect Authorization",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:15:08Z",
      "updated": "2026-04-03T03:15:09Z",
      "refs": [
        "https://github.com/advisories/GHSA-gjm7-hw8f-73rq"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-9p3r-hh9g-5cmg",
      "title": "OpenClaw: Sandbox escape via TOCTOU race in remote FS bridge readFile",
      "description": "## Summary\nSandbox escape via TOCTOU race in remote FS bridge readFile\n\n## Current Maintainer Triage\n- Normalized severity: critical\n- Assessment: v2026.3.28 remote sandbox reads still do path-check then separate file read, so the TOCTOU sandbox escape remains present in the latest shipped tag.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Latest published npm version: `2026.3.31`",
      "severity": "critical",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-367",
      "cwe_name": "Time-of-check Time-of-use (TOCTOU) Race Condition",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:14:16Z",
      "updated": "2026-04-03T03:14:17Z",
      "refs": [
        "https://github.com/advisories/GHSA-9p3r-hh9g-5cmg"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-2w79-r9g8-wmcr",
      "title": "OpenClaw: Voice-call still parses large WebSocket frames before start validation (Incomplete fix for CVE-2026-32062)",
      "description": "## Summary\nIncomplete fix for CVE-2026-32062: voice-call still parses large WebSocket frames before start validation\n\n## Current Maintainer Triage\n- Normalized severity: medium\n- Assessment: v2026.3.28 still parses oversized pre-start voice-call WebSocket frames before start validation, and the unreleased maxPayload fix confirms the shipped resource-consumption bug remains open.\n\n## Affected Packa",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-400",
      "cwe_name": "Uncontrolled Resource Consumption",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:13:35Z",
      "updated": "2026-04-03T03:13:36Z",
      "refs": [
        "https://github.com/advisories/GHSA-2w79-r9g8-wmcr"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-rfqg-qgf8-xr9x",
      "title": "OpenClaw: Gateway `device.token.rotate` does not terminate active WebSocket sessions after credential rotation",
      "description": "## Summary\nGateway `device.token.rotate` does not terminate active WebSocket sessions after credential rotation\n\n## Current Maintainer Triage\n- Normalized severity: low\n- Assessment: v2026.3.28 rotates device tokens without disconnecting already-authenticated WebSocket sessions, which is a real but post-compromise revocation gap.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Lates",
      "severity": "low",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-613",
      "cwe_name": "Insufficient Session Expiration",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:11:33Z",
      "updated": "2026-04-03T03:11:34Z",
      "refs": [
        "https://github.com/advisories/GHSA-rfqg-qgf8-xr9x"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-6p8r-6m93-557f",
      "title": "OpenClaw: Fake DeviceToken Bypasses Shared Auth Rate Limiting",
      "description": "## Summary\nFake DeviceToken Bypasses Shared Auth Rate Limiting\n\n## Current Maintainer Triage\n- Status: narrow\n- Normalized severity: low\n- Assessment: Real in shipped mixed WS auth flow, but practical risk is mostly weak shared-password deployments since strong shared tokens remain non-bruteforceable.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Latest published npm version: `202",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-307",
      "cwe_name": "Improper Restriction of Excessive Authentication Attempts",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:09:18Z",
      "updated": "2026-04-03T03:09:19Z",
      "refs": [
        "https://github.com/advisories/GHSA-6p8r-6m93-557f"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-cg7q-fg22-4g98",
      "title": "OpenClaw: Host exec environment sanitization misses package, registry, Docker, compiler, and TLS override variables",
      "description": "## Summary\nHost exec environment sanitization misses package, registry, Docker, compiler, and TLS override variables\n\n## Current Maintainer Triage\n- Normalized severity: medium\n- Assessment: v2026.3.28 also misses the broader package, registry, compiler, Docker, and TLS env family in the shipped host-env policy, and the unreleased main fix means this is a real medium-severity open issue.\n\n## Affec",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-184",
      "cwe_name": "Incomplete List of Disallowed Inputs",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:07:13Z",
      "updated": "2026-04-03T03:07:14Z",
      "refs": [
        "https://github.com/advisories/GHSA-cg7q-fg22-4g98"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-58q2-7r52-jq62",
      "title": "OpenClaw: Path traversal via inbound channel attachment path in ACP dispatch allows arbitrary file read",
      "description": "## Summary\nPath traversal via inbound channel attachment path in ACP dispatch allows arbitrary file read\n\n## Current Maintainer Triage\n- Normalized severity: medium\n- Assessment: v2026.3.28 ACP dispatch still reads attachment paths outside the guarded attachment-cache or root checks, and the root-enforcement fix is not yet shipped.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Lat",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-22",
      "cwe_name": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:06:18Z",
      "updated": "2026-04-03T03:06:19Z",
      "refs": [
        "https://github.com/advisories/GHSA-58q2-7r52-jq62"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 5.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0 | CWE_HIGH+5"
    },
    {
      "cve": "GHSA-g374-mggx-p6xc",
      "title": "OpenClaw: Incomplete scope-clearing fix allows operator.admin escalation via trusted-proxy auth mode",
      "description": "## Summary\nIncomplete scope-clearing fix allows operator.admin escalation via trusted-proxy auth mode\n\n## Current Maintainer Triage\n- Normalized severity: high\n- Assessment: v2026.3.28 still misses trusted-proxy scope clearing for non-Control-UI clients, so self-declared operator scopes can survive on a real identity-bearing auth path; the complete fix is unreleased.\n\n## Affected Packages / Versio",
      "severity": "high",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-863",
      "cwe_name": "Incorrect Authorization",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:05:48Z",
      "updated": "2026-04-03T03:05:48Z",
      "refs": [
        "https://github.com/advisories/GHSA-g374-mggx-p6xc"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-f6pf-4gjx-c94r",
      "title": "OpenClaw: Media Parsing Path Traversal Leads to Arbitrary File Read",
      "description": "## Summary\nOpenClaw <= 2026.3.24 Media Parsing Path Traversal to Arbitrary File Read\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Latest published npm version: `2026.3.31`\n- Vulnerable version range: `<=2026.3.24`\n- Patched versions: `>= 2026.3.28`\n- First stable tag containing the fix: `v2026.3.28`\n\n## Fix Commit(s)\n- `4797bbc5b96e2cca5532e43b58915c051746fe37` — 2026-03-25T13:35",
      "severity": "high",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-22",
      "cwe_name": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:05:07Z",
      "updated": "2026-04-03T03:05:08Z",
      "refs": [
        "https://github.com/advisories/GHSA-f6pf-4gjx-c94r"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 5.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0 | CWE_HIGH+5"
    },
    {
      "cve": "GHSA-v3qc-wrwx-j3pw",
      "title": "OpenClaw: Agentic Consent Bypass — LLM Agent Can Silently Disable Exec Approval via `config.patch`",
      "description": "## Summary\nAgentic Consent Bypass: LLM Agent Can Silently Disable Exec Approval via `config.patch`\n\n## Current Maintainer Triage\n- Status: open\n- Normalized severity: high\n- Assessment: Maintainers accepted this issue, fixed it in 76411b2afc4ae721e36c12e0ea24fd23e2fed61e on 2026-03-27, and that fix shipped in v2026.3.28, so normalize it as a fixed released draft rather than a close-by-trust-model ",
      "severity": "high",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-285",
      "cwe_name": "Improper Authorization",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:03:18Z",
      "updated": "2026-04-03T03:03:19Z",
      "refs": [
        "https://github.com/advisories/GHSA-v3qc-wrwx-j3pw"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-hr8g-2q7x-3f4w",
      "title": "OpenClaw Has a Gateway Control Interface Information Disclosure Vulnerability",
      "description": "## Summary\nOpenClaw Gateway Control Interface Information Disclosure Vulnerability\n\n## Current Maintainer Triage\n- Status: narrow\n- Normalized severity: low\n- Assessment: Released Control UI bootstrap JSON did expose version and assistant agent id, but that is low-severity fingerprinting or info disclosure only; unreleased c5c10adc trims the payload.\n\n## Affected Packages / Versions\n- Package: `op",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-200",
      "cwe_name": "Exposure of Sensitive Information to an Unauthorized Actor",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:02:37Z",
      "updated": "2026-04-03T03:02:38Z",
      "refs": [
        "https://github.com/advisories/GHSA-hr8g-2q7x-3f4w"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-w85g-3h6x-4xh2",
      "title": "OpenClaw: Image pixel-limit guard can fail open on sips and allow decompression-bomb DoS",
      "description": "## Summary\nImage pixel-limit guard can fail open on sips and allow decompression-bomb DoS\n\n## Current Maintainer Triage\n- Status: open\n- Normalized severity: medium\n- Assessment: Shipped v2026.3.28 image processing could fail open on oversized pixel counts and allow decompression-bomb DoS, an availability issue that is valid at medium.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n-",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-770",
      "cwe_name": "Allocation of Resources Without Limits or Throttling",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:01:18Z",
      "updated": "2026-04-03T03:01:18Z",
      "refs": [
        "https://github.com/advisories/GHSA-w85g-3h6x-4xh2"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-g8xp-qx39-9jq9",
      "title": "OpenClaw: Incomplete host-env-security-policy allows untrusted model to substitute compiler binaries via env overrides",
      "description": "## Summary\nIncomplete `host-env-security-policy.json` allows untrusted model to substitute compiler binaries (`CC`, `CXX`, `CARGO_BUILD_RUSTC`, `CMAKE_C_COMPILER`) via env overrides on approved host exec requests\n\n## Current Maintainer Triage\n- Status: narrow\n- Normalized severity: medium\n- Assessment: Shipped v2026.3.28 host-env policy missed compiler override vars, but exploitation still require",
      "severity": "high",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-427",
      "cwe_name": "Uncontrolled Search Path Element",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T03:00:51Z",
      "updated": "2026-04-03T03:00:53Z",
      "refs": [
        "https://github.com/advisories/GHSA-g8xp-qx39-9jq9"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-xj9w-5r6q-x6v4",
      "title": "OpenClaw: Device-Paired Node Skips Node Scope Gate → Host RCE.md",
      "description": "## Summary\nDevice-Paired Node Skips Node Scope Gate → Host RCE.md\n\n## Current Maintainer Triage\n- Status: open\n- Normalized severity: high\n- Assessment: Real in shipped v2026.3.28 because a merely device-paired node could expose node commands without node pairing, but high is sufficient given the pairing/setup prerequisites.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Latest pub",
      "severity": "high",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-863",
      "cwe_name": "Incorrect Authorization",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:59:03Z",
      "updated": "2026-04-03T02:59:03Z",
      "refs": [
        "https://github.com/advisories/GHSA-xj9w-5r6q-x6v4"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-37v6-fxx8-xjmx",
      "title": "OpenClaw: Telnyx Webhook Replay Detection Bypass via Base64 Signature Re-encoding",
      "description": "## Summary\nTelnyx Webhook Replay Detection Bypass via Base64 Signature Re-encoding\n\n## Current Maintainer Triage\n- Status: narrow\n- Normalized severity: low\n- Assessment: Shipped v2026.3.28 replay hashing treated equivalent Telnyx Base64/Base64URL signatures as distinct requests, but signature verification still held, so lower to low.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- ",
      "severity": "low",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-294",
      "cwe_name": "Authentication Bypass by Capture-replay",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:58:17Z",
      "updated": "2026-04-03T02:58:18Z",
      "refs": [
        "https://github.com/advisories/GHSA-37v6-fxx8-xjmx"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Play",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 60.0,
      "priority_band": "P2",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "GHSA-9gp8-hjxr-6f34",
      "title": "OpenClaw: Host exec environment overrides miss proxy, TLS, Docker, and Git TLS controls",
      "description": "## Summary\nHost exec environment overrides miss proxy, TLS, Docker, and Git TLS controls\n\n## Current Maintainer Triage\n- Status: open\n- Normalized severity: medium\n- Assessment: Real in shipped v2026.3.28: host exec env policy still missed proxy, TLS, Docker, and Git TLS variables until 4d912e0451 on 2026-03-31; maintainers already accepted it and the fix is unreleased.\n\n## Affected Packages / Ver",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-269",
      "cwe_name": "Improper Privilege Management",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:57:00Z",
      "updated": "2026-04-03T02:57:03Z",
      "refs": [
        "https://github.com/advisories/GHSA-9gp8-hjxr-6f34"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-hhff-fj5f-qg48",
      "title": "OpenClaw runs Discord audio preflight transcription before member authorization",
      "description": "## Summary\nDiscord audio preflight transcription before member authorization\n\n## Current Maintainer Triage\n- Status: narrow\n- Normalized severity: medium\n- Assessment: v2026.3.28 still runs Discord audio preflight before member allowlist rejection, but this is the same pre-auth resource-consumption class and not the high-severity auth-bypass framing in the draft.\n\n## Affected Packages / Versions\n-",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-770",
      "cwe_name": "Allocation of Resources Without Limits or Throttling",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:56:20Z",
      "updated": "2026-04-03T02:56:23Z",
      "refs": [
        "https://github.com/advisories/GHSA-hhff-fj5f-qg48"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-mhr7-2xmv-4c4q",
      "title": "OpenClaw: HTTP operator endpoints lack browser-origin validation in trusted-proxy mode",
      "description": "## Summary\nHTTP operator endpoints lack browser-origin validation in trusted-proxy mode\n\n## Current Maintainer Triage\n- Status: narrow\n- Normalized severity: medium\n- Assessment: This is a real trusted-proxy HTTP CSRF or browser-origin gap in released tags, but it is not critical because it depends on identity-bearing trusted-proxy browser deployments rather than the shared-secret HTTP operator mo",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-346",
      "cwe_name": "Origin Validation Error",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:55:08Z",
      "updated": "2026-04-03T02:55:08Z",
      "refs": [
        "https://github.com/advisories/GHSA-mhr7-2xmv-4c4q"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-p464-m8x6-vhv8",
      "title": "OpenClaw: MS Teams webhook parses body before JWT validation, enabling unauthenticated resource exhaustion",
      "description": "## Summary\nMS Teams webhook parses body before JWT validation, enabling unauthenticated resource exhaustion\n\n## Current Maintainer Triage\n- Status: open\n- Normalized severity: medium\n- Assessment: v2026.3.28 still parses Teams JSON after only a Bearer-prefix gate and before real JWT validation, and the auth-before-parse fix is not yet shipped.\n\n## Affected Packages / Versions\n- Package: `openclaw`",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-400",
      "cwe_name": "Uncontrolled Resource Consumption",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:54:38Z",
      "updated": "2026-04-03T02:54:38Z",
      "refs": [
        "https://github.com/advisories/GHSA-p464-m8x6-vhv8"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-57gh-m6rq-54cf",
      "title": "OpenClaw: Self-Whitelisting in appendLocalMediaParentRoots Allows Arbitrary File Read & Credential Exfiltration",
      "description": "## Summary\nMedia Local Roots Self-Whitelisting in `appendLocalMediaParentRoots` Allows Model-Initiated Arbitrary Host File Read and Credential Exfiltration\n\n## Current Maintainer Triage\n- Status: narrow\n- Normalized severity: medium\n- Assessment: v2026.3.28 still self-whitelists media parent dirs in src/media/local-roots.ts, but only after config already permits tool-fs root expansion, so the impa",
      "severity": "high",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-552",
      "cwe_name": "Files or Directories Accessible to External Parties",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:53:58Z",
      "updated": "2026-04-03T02:53:59Z",
      "refs": [
        "https://github.com/advisories/GHSA-57gh-m6rq-54cf"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-68v4-hmwv-f43h",
      "title": "OpenClaw: Media download follows cross-origin redirects with Authorization headers intact",
      "description": "## Summary\nMedia download follows cross-origin redirects with Authorization headers intact\n\n## Current Maintainer Triage\n- Status: open\n- Normalized severity: medium\n- Assessment: Shipped v2026.3.28 media downloads forwarded Authorization across cross-origin redirects, a real in-scope credential-leak class that fits medium.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Latest publ",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-522",
      "cwe_name": "Insufficiently Protected Credentials",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:49:40Z",
      "updated": "2026-04-03T02:49:42Z",
      "refs": [
        "https://github.com/advisories/GHSA-68v4-hmwv-f43h"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-cwf8-44x6-32c2",
      "title": "OpenClaw: OpenShell Mirror Sync — Sandbox Escape via Unrestricted File Sync + Symlink Traversal",
      "description": "## Summary\nOpenShell Mirror Sync: Sandbox Escape via Unrestricted File Sync + Symlink Traversal\n\n## Current Maintainer Triage\n- Status: narrow\n- Normalized severity: high\n- Assessment: v2026.3.28 still has the mirror-boundary bug because shipped c02ee8 only excluded hooks while unreleased 3b9dab is the first full symlink-free upload and download hardening.\n\n## Affected Packages / Versions\n- Packag",
      "severity": "high",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-59",
      "cwe_name": "Improper Link Resolution Before File Access ('Link Following')",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:49:14Z",
      "updated": "2026-04-03T02:49:17Z",
      "refs": [
        "https://github.com/advisories/GHSA-cwf8-44x6-32c2"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-qcj9-wwgw-6gm8",
      "title": "OpenClaw: Workspace `.env` can override the bundled plugin trust root",
      "description": "## Summary\nWorkspace `.env` can override the bundled plugin trust root\n\n## Current Maintainer Triage\n- Status: open\n- Normalized severity: high\n- Assessment: v2026.3.28 still lets workspace .env override OPENCLAW_BUNDLED_PLUGINS_DIR, but critical is too high because exploitation still depends on attacker-controlled workspace loading, not a universal remote break.\n\n## Affected Packages / Versions\n-",
      "severity": "high",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-15",
      "cwe_name": "External Control of System or Configuration Setting",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:47:57Z",
      "updated": "2026-04-03T02:47:57Z",
      "refs": [
        "https://github.com/advisories/GHSA-qcj9-wwgw-6gm8"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-34780",
      "title": "Electron: Context Isolation bypass via contextBridge VideoFrame transfer",
      "description": "### Impact\nApps that pass `VideoFrame` objects (from the WebCodecs API) across the `contextBridge` are vulnerable to a context isolation bypass. An attacker who can execute JavaScript in the main world (for example, via XSS) can use a bridged `VideoFrame` to gain access to the isolated world, including any Node.js APIs exposed to the preload script.\n\nApps are only affected if a preload script retu",
      "severity": "high",
      "cvss": 8.4,
      "cvss_vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "electron",
      "cwe": "CWE-668",
      "cwe_name": "Exposure of Resource to Wrong Sphere",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:46:56Z",
      "updated": "2026-04-03T02:46:57Z",
      "refs": [
        "https://github.com/advisories/GHSA-jfqg-hf23-qpw2"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 50.4,
      "priority_band": "P3",
      "score_breakdown": "CVSS 8.4×6=50.4 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-34779",
      "title": "Electron: AppleScript injection in app.moveToApplicationsFolder on macOS",
      "description": "### Impact\nOn macOS, `app.moveToApplicationsFolder()` used an AppleScript fallback path that did not properly handle certain characters in the application bundle path. Under specific conditions, a crafted launch path could lead to arbitrary AppleScript execution when the user accepted the move-to-Applications prompt.\n\nApps are only affected if they call `app.moveToApplicationsFolder()`. Apps that ",
      "severity": "medium",
      "cvss": 6.5,
      "cvss_vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "electron",
      "cwe": "CWE-78",
      "cwe_name": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:46:16Z",
      "updated": "2026-04-03T02:46:17Z",
      "refs": [
        "https://github.com/advisories/GHSA-5rqw-r77c-jp79"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 44.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 6.5×6=39.0 | EPSS 0.000×120=0.0 | CWE_HIGH+5"
    },
    {
      "cve": "CVE-2026-34778",
      "title": "Electron: Service worker can spoof executeJavaScript IPC replies",
      "description": "### Impact\nA service worker running in a session could spoof reply messages on the internal IPC channel used by `webContents.executeJavaScript()` and related methods, causing the main-process promise to resolve with attacker-controlled data.\n\nApps are only affected if they have service workers registered and use the result of `webContents.executeJavaScript()` (or `webFrameMain.executeJavaScript()`",
      "severity": "medium",
      "cvss": 5.9,
      "cvss_vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "electron",
      "cwe": "CWE-290",
      "cwe_name": "Authentication Bypass by Spoofing",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:44:59Z",
      "updated": "2026-04-03T02:45:02Z",
      "refs": [
        "https://github.com/advisories/GHSA-xj5x-m3f3-5x3h"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 35.4,
      "priority_band": "P3",
      "score_breakdown": "CVSS 5.9×6=35.4 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-34777",
      "title": "Electron: Incorrect origin passed to permission request handler for iframe requests",
      "description": "### Impact\nWhen an iframe requests `fullscreen`, `pointerLock`, `keyboardLock`, `openExternal`, or `media` permissions, the origin passed to `session.setPermissionRequestHandler()` was the top-level page's origin rather than the requesting iframe's origin. Apps that grant permissions based on the origin parameter or `webContents.getURL()` may inadvertently grant permissions to embedded third-party",
      "severity": "medium",
      "cvss": 5.4,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "electron",
      "cwe": "CWE-346",
      "cwe_name": "Origin Validation Error",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:44:26Z",
      "updated": "2026-04-03T02:44:26Z",
      "refs": [
        "https://github.com/advisories/GHSA-r5p7-gp4j-qhrx"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 32.4,
      "priority_band": "P3",
      "score_breakdown": "CVSS 5.4×6=32.4 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-34776",
      "title": "Electron: Out-of-bounds read in second-instance IPC on macOS and Linux",
      "description": "### Impact\nOn macOS and Linux, apps that call `app.requestSingleInstanceLock()` were vulnerable to an out-of-bounds heap read when parsing a crafted second-instance message. Leaked memory could be delivered to the app's `second-instance` event handler.\n\nThis issue is limited to processes running as the same user as the Electron app.\n\nApps that do not call `app.requestSingleInstanceLock()` are not ",
      "severity": "medium",
      "cvss": 5.3,
      "cvss_vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "electron",
      "cwe": "CWE-125",
      "cwe_name": "Out-of-bounds Read",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:43:59Z",
      "updated": "2026-04-03T02:44:01Z",
      "refs": [
        "https://github.com/advisories/GHSA-3c8v-cfp5-9885"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 36.8,
      "priority_band": "P3",
      "score_breakdown": "CVSS 5.3×6=31.8 | EPSS 0.000×120=0.0 | CWE_HIGH+5"
    },
    {
      "cve": "CVE-2026-34775",
      "title": "Electron: nodeIntegrationInWorker not correctly scoped in shared renderer processes",
      "description": "### Impact\nThe `nodeIntegrationInWorker` webPreference was not correctly scoped in all configurations. In certain process-sharing scenarios, workers spawned in frames configured with `nodeIntegrationInWorker: false` could still receive Node.js integration.\n\nApps are only affected if they enable `nodeIntegrationInWorker`. Apps that do not use `nodeIntegrationInWorker` are not affected.\n\n### Workaro",
      "severity": "medium",
      "cvss": 6.8,
      "cvss_vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "electron",
      "cwe": "CWE-653",
      "cwe_name": "Improper Isolation or Compartmentalization",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:43:05Z",
      "updated": "2026-04-03T02:43:06Z",
      "refs": [
        "https://github.com/advisories/GHSA-xwr5-m59h-vwqr"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 40.8,
      "priority_band": "P3",
      "score_breakdown": "CVSS 6.8×6=40.8 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-34774",
      "title": "Electron: Use-after-free in offscreen child window paint callback",
      "description": "### Impact\nApps that use offscreen rendering and allow child windows via `window.open()` may be vulnerable to a use-after-free. If the parent offscreen `WebContents` is destroyed while a child window remains open, subsequent paint frames on the child dereference freed memory, which may lead to a crash or memory corruption.\n\nApps are only affected if they use offscreen rendering (`webPreferences.of",
      "severity": "high",
      "cvss": 8.1,
      "cvss_vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "electron",
      "cwe": "CWE-416",
      "cwe_name": "Use After Free",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:42:27Z",
      "updated": "2026-04-03T02:42:31Z",
      "refs": [
        "https://github.com/advisories/GHSA-532v-xpq5-8h95"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 53.6,
      "priority_band": "P3",
      "score_breakdown": "CVSS 8.1×6=48.6 | EPSS 0.000×120=0.0 | CWE_HIGH+5"
    },
    {
      "cve": "CVE-2026-34773",
      "title": "Electron: Registry key path injection in app.setAsDefaultProtocolClient on Windows",
      "description": "### Impact\nOn Windows, `app.setAsDefaultProtocolClient(protocol)` did not validate the protocol name before writing to the registry. Apps that pass untrusted input as the protocol name may allow an attacker to write to arbitrary subkeys under `HKCU\\Software\\Classes\\`, potentially hijacking existing protocol handlers.\n\nApps are only affected if they call `app.setAsDefaultProtocolClient()` with a pr",
      "severity": "medium",
      "cvss": 4.7,
      "cvss_vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "electron",
      "cwe": "CWE-20",
      "cwe_name": "Improper Input Validation",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:41:52Z",
      "updated": "2026-04-03T02:41:56Z",
      "refs": [
        "https://github.com/advisories/GHSA-mwmh-mq4g-g6gr"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 33.2,
      "priority_band": "P3",
      "score_breakdown": "CVSS 4.7×6=28.2 | EPSS 0.000×120=0.0 | CWE_HIGH+5"
    },
    {
      "cve": "CVE-2026-34772",
      "title": "Electron: Use-after-free in download save dialog callback",
      "description": "### Impact\nApps that allow downloads and programmatically destroy sessions may be vulnerable to a use-after-free. If a session is torn down while a native save-file dialog is open for a download, dismissing the dialog dereferences freed memory, which may lead to a crash or memory corruption.\n\nApps that do not destroy sessions at runtime, or that do not permit downloads, are not affected.\n\n### Work",
      "severity": "medium",
      "cvss": 5.8,
      "cvss_vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "electron",
      "cwe": "CWE-416",
      "cwe_name": "Use After Free",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:41:23Z",
      "updated": "2026-04-03T02:41:26Z",
      "refs": [
        "https://github.com/advisories/GHSA-9w97-2464-8783"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 39.8,
      "priority_band": "P3",
      "score_breakdown": "CVSS 5.8×6=34.8 | EPSS 0.000×120=0.0 | CWE_HIGH+5"
    },
    {
      "cve": "CVE-2026-34771",
      "title": "Electron: Use-after-free in WebContents fullscreen, pointer-lock, and keyboard-lock permission callbacks",
      "description": "### Impact\nApps that register an asynchronous `session.setPermissionRequestHandler()` may be vulnerable to a use-after-free when handling fullscreen, pointer-lock, or keyboard-lock permission requests. If the requesting frame navigates or the window closes while the permission handler is pending, invoking the stored callback dereferences freed memory, which may lead to a crash or memory corruption",
      "severity": "high",
      "cvss": 7.5,
      "cvss_vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "electron",
      "cwe": "CWE-416",
      "cwe_name": "Use After Free",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:40:24Z",
      "updated": "2026-04-03T02:40:26Z",
      "refs": [
        "https://github.com/advisories/GHSA-8337-3p73-46f4"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 50.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 7.5×6=45.0 | EPSS 0.000×120=0.0 | CWE_HIGH+5"
    },
    {
      "cve": "CVE-2026-34770",
      "title": "Electron: Use-after-free in PowerMonitor on Windows and macOS",
      "description": "### Impact\nApps that use the `powerMonitor` module may be vulnerable to a use-after-free. After the native `PowerMonitor` object is garbage-collected, the associated OS-level resources (a message window on Windows, a shutdown handler on macOS) retain dangling references. A subsequent session-change event (Windows) or system shutdown (macOS) dereferences freed memory, which may lead to a crash or m",
      "severity": "high",
      "cvss": 7.0,
      "cvss_vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "electron",
      "cwe": "CWE-416",
      "cwe_name": "Use After Free",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:39:52Z",
      "updated": "2026-04-03T02:39:56Z",
      "refs": [
        "https://github.com/advisories/GHSA-jjp3-mq3x-295m"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 47.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 7.0×6=42.0 | EPSS 0.000×120=0.0 | CWE_HIGH+5"
    },
    {
      "cve": "CVE-2026-34769",
      "title": "Electron: Renderer command-line switch injection via undocumented commandLineSwitches webPreference",
      "description": "### Impact\nAn undocumented `commandLineSwitches` webPreference allowed arbitrary switches to be appended to the renderer process command line. Apps that construct `webPreferences` by spreading untrusted configuration objects may inadvertently allow an attacker to inject switches that disable renderer sandboxing or web security controls.\n\nApps are only affected if they construct `webPreferences` fr",
      "severity": "high",
      "cvss": 7.8,
      "cvss_vector": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "electron",
      "cwe": "CWE-88",
      "cwe_name": "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:39:15Z",
      "updated": "2026-04-03T02:39:16Z",
      "refs": [
        "https://github.com/advisories/GHSA-9wfr-w7mm-pc7f"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 46.8,
      "priority_band": "P3",
      "score_breakdown": "CVSS 7.8×6=46.8 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-34768",
      "title": "Electron: Unquoted executable path in app.setLoginItemSettings on Windows",
      "description": "### Impact\nOn Windows, `app.setLoginItemSettings({openAtLogin: true})` wrote the executable path to the `Run` registry key without quoting. If the app is installed to a path containing spaces, an attacker with write access to an ancestor directory may be able to cause a different executable to run at login instead of the intended app.\n\nOn a default Windows install, standard system directories are ",
      "severity": "low",
      "cvss": 3.9,
      "cvss_vector": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "electron",
      "cwe": "CWE-428",
      "cwe_name": "Unquoted Search Path or Element",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:38:08Z",
      "updated": "2026-04-03T02:38:11Z",
      "refs": [
        "https://github.com/advisories/GHSA-jfqx-fxh3-c62j"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 23.4,
      "priority_band": "P3",
      "score_breakdown": "CVSS 3.9×6=23.4 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-34767",
      "title": "Electron: HTTP Response Header Injection in custom protocol handlers and webRequest",
      "description": "### Impact\nApps that register custom protocol handlers via `protocol.handle()` / `protocol.registerSchemesAsPrivileged()` or modify response headers via `webRequest.onHeadersReceived` may be vulnerable to HTTP response header injection if attacker-controlled input is reflected into a response header name or value.\n\nAn attacker who can influence a header value may be able to inject additional respo",
      "severity": "medium",
      "cvss": 5.9,
      "cvss_vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "electron",
      "cwe": "CWE-74",
      "cwe_name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:37:24Z",
      "updated": "2026-04-03T02:37:26Z",
      "refs": [
        "https://github.com/advisories/GHSA-4p4r-m79c-wq3v"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 35.4,
      "priority_band": "P3",
      "score_breakdown": "CVSS 5.9×6=35.4 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-34766",
      "title": "Electron: USB device selection not validated against filtered device list",
      "description": "### Impact\nThe `select-usb-device` event callback did not validate the chosen device ID against the filtered list that was presented to the handler. An app whose handler could be influenced to select a device ID outside the filtered set would grant access to a device that did not match the renderer's requested `filters` or was listed in `exclusionFilters`.\n\nThe WebUSB security blocklist remained e",
      "severity": "low",
      "cvss": 3.3,
      "cvss_vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "electron",
      "cwe": "CWE-862",
      "cwe_name": "Missing Authorization",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-03T02:36:52Z",
      "updated": "2026-04-03T02:36:53Z",
      "refs": [
        "https://github.com/advisories/GHSA-9899-m83m-qhpj"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 19.8,
      "priority_band": "P3",
      "score_breakdown": "CVSS 3.3×6=19.8 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-ccgf-5rwj-j3hv",
      "title": "TeleJSON: DOM XSS via unsanitised constructor name in `new Function()`",
      "description": "## Summary\n \ntelejson versions prior to 6.0.0 (released 2022) are vulnerable to DOM-based Cross-Site Scripting (XSS) through unsafe deserialisation. Attacker-controlled input from the `_constructor-name_` property in parsed JSON is passed directly to `new Function()` without sanitisation, allowing arbitrary JavaScript execution.\n \n## Affected versions\n \n| Package  | Affected  | Fixed    |\n|-------",
      "severity": "low",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "telejson",
      "cwe": "CWE-79",
      "cwe_name": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-02T23:21:23Z",
      "updated": "2026-04-02T23:21:26Z",
      "refs": [
        "https://github.com/advisories/GHSA-ccgf-5rwj-j3hv"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 5.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0 | CWE_HIGH+5"
    },
    {
      "cve": "GHSA-cwq8-6f96-g3q4",
      "title": "OpenClaw: Security Scan Failure Does Not Block Plugin Installation (Fail-Open)",
      "description": "## Summary\nSecurity Scan Failure Does Not Block Plugin Installation (Fail-Open)\n\n## Current Maintainer Triage\n- Status: open\n- Normalized severity: low\n- Assessment: Real in shipped v2026.3.28 plugin install flow, but low severity fits because it still requires an operator to choose installation of an untrusted package and the scan failure was visible rather than silent.\n\n## Affected Packages / Ve",
      "severity": "low",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-636",
      "cwe_name": "Not Failing Securely ('Failing Open')",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-02T21:24:03Z",
      "updated": "2026-04-02T21:24:04Z",
      "refs": [
        "https://github.com/advisories/GHSA-cwq8-6f96-g3q4"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-fv94-qvg8-xqpw",
      "title": "OpenClaw: SSH sandbox tar upload follows symlinks, enabling arbitrary file write on remote host",
      "description": "## Summary\nSSH sandbox tar upload follows symlinks, enabling arbitrary file write on remote host\n\n## Current Maintainer Triage\n- Status: open\n- Normalized severity: high\n- Assessment: Real in shipped v2026.3.28: SSH sandbox tar upload lacked pre-upload symlink escape rejection until 3d5af14984 on 2026-03-31; maintainers already accepted it and the fix is unreleased.\n\n## Affected Packages / Version",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-59",
      "cwe_name": "Improper Link Resolution Before File Access ('Link Following')",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-02T21:23:32Z",
      "updated": "2026-04-02T21:23:34Z",
      "refs": [
        "https://github.com/advisories/GHSA-fv94-qvg8-xqpw"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-9q7v-8mr7-g23p",
      "title": "OpenClaw: SSRF via Unguarded `fetch()` in Marketplace Plugin Download and Ollama Model Discovery",
      "description": "## Summary\nSSRF via Unguarded `fetch()` in Marketplace Plugin Download and Ollama Model Discovery\n\n## Current Maintainer Triage\n- Status: narrow\n- Normalized severity: medium\n- Assessment: Keep the shipped marketplace archive-fetch SSRF, but narrow out the Ollama half because it is operator-configured and overlaps weaker trust-model or duplicate SSRF ground.\n\n## Affected Packages / Versions\n- Pack",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-918",
      "cwe_name": "Server-Side Request Forgery (SSRF)",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-02T21:22:56Z",
      "updated": "2026-04-02T21:22:57Z",
      "refs": [
        "https://github.com/advisories/GHSA-9q7v-8mr7-g23p"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Hive",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 65.0,
      "priority_band": "P2",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0 | CWE_HIGH+5 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "GHSA-j9pv-rrcj-6pfx",
      "title": "OpenClaw: SSH-based sandbox backends pass unsanitized process.env to child processes",
      "description": "## Summary\nSSH-based sandbox backends pass unsanitized process.env to child processes\n\n## Current Maintainer Triage\n- Status: narrow\n- Normalized severity: low\n- Assessment: Shipped SSH sandbox paths leaked unsanitized env into local SSH child processes, but remote leakage needs non-default SSH env forwarding, so lower to low.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Latest p",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-212",
      "cwe_name": "Improper Removal of Sensitive Information Before Storage or Transfer",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-02T21:01:57Z",
      "updated": "2026-04-02T21:01:57Z",
      "refs": [
        "https://github.com/advisories/GHSA-j9pv-rrcj-6pfx"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-chfm-xgc4-47rj",
      "title": "OpenClaw: MSTeams thread history bypasses sender allowlist via Graph API",
      "description": "## Summary\nMSTeams thread history bypasses sender allowlist via Graph API\n\n## Current Maintainer Triage\n- Status: open\n- Normalized severity: medium\n- Assessment: Real in shipped v2026.3.28 MS Teams because Graph-fetched thread history bypasses sender allowlists, with unreleased mainline filtering fix.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Latest published npm version: `20",
      "severity": "low",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-863",
      "cwe_name": "Incorrect Authorization",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-02T21:01:28Z",
      "updated": "2026-04-02T21:01:32Z",
      "refs": [
        "https://github.com/advisories/GHSA-chfm-xgc4-47rj"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-qcc3-jqwp-5vh2",
      "title": "OpenClaw: LINE webhook handler lacks shared pre-auth concurrency budget before signature verification",
      "description": "## Summary\nLINE webhook handler lacks shared pre-auth concurrency budget before signature verification\n\n## Current Maintainer Triage\n- Status: open\n- Normalized severity: low\n- Assessment: Shipped v2026.3.28 lacks a shared pre-auth concurrency budget on the public LINE webhook path, but the effect is bounded transient availability loss only, so low fits.\n\n## Affected Packages / Versions\n- Package:",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-770",
      "cwe_name": "Allocation of Resources Without Limits or Throttling",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-02T21:01:08Z",
      "updated": "2026-04-02T21:01:12Z",
      "refs": [
        "https://github.com/advisories/GHSA-qcc3-jqwp-5vh2"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-rg8m-3943-vm6q",
      "title": "OpenClaw: Matrix thread root and reply context bypass sender allowlist",
      "description": "## Summary\nMatrix thread root and reply context bypass sender allowlist\n\n## Current Maintainer Triage\n- Status: open\n- Normalized severity: medium\n- Assessment: Real in shipped v2026.3.28 Matrix because fetched thread-root/reply context bypasses sender allowlists, with unreleased mainline filtering fix.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Latest published npm version: `2",
      "severity": "low",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-863",
      "cwe_name": "Incorrect Authorization",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-02T21:00:44Z",
      "updated": "2026-04-02T21:00:47Z",
      "refs": [
        "https://github.com/advisories/GHSA-rg8m-3943-vm6q"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-3qpv-xf3v-mm45",
      "title": "OpenClaw: Workspace `.env` can override the bundled hooks root and load attacker hook code",
      "description": "## Summary\nWorkspace `.env` can override the bundled hooks root and load attacker hook code\n\n## Current Maintainer Triage\n- Status: open\n- Normalized severity: high\n- Assessment: v2026.3.28 still lets workspace .env override OPENCLAW_BUNDLED_HOOKS_DIR, which can replace trusted default-on bundled hooks from an untrusted workspace.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Late",
      "severity": "high",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-15",
      "cwe_name": "External Control of System or Configuration Setting",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-02T21:00:16Z",
      "updated": "2026-04-02T21:00:17Z",
      "refs": [
        "https://github.com/advisories/GHSA-3qpv-xf3v-mm45"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-877v-w3f5-3pcq",
      "title": "OpenClaw: Feishu thread history and quoted messages bypass sender allowlist",
      "description": "## Summary\nFeishu thread history and quoted messages bypass sender allowlist\n\n## Current Maintainer Triage\n- Status: open\n- Normalized severity: medium\n- Assessment: Real in shipped v2026.3.28 Feishu because fetched quoted/root/thread context bypasses sender allowlists, and SECURITY.md does not exempt remote sender-allowlist bypasses.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- ",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-863",
      "cwe_name": "Incorrect Authorization",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-02T20:59:49Z",
      "updated": "2026-04-02T20:59:51Z",
      "refs": [
        "https://github.com/advisories/GHSA-877v-w3f5-3pcq"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-g5cg-8x5w-7jpm",
      "title": "OpenClaw: Heartbeat context inheritance bypasses sandbox via senderIsOwner escalation",
      "description": "## Summary\nHeartbeat context inheritance bypasses sandbox via senderIsOwner escalation\n\n## Current Maintainer Triage\n- Status: open\n- Normalized severity: Critical\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Latest published npm version: `2026.3.31`\n- Vulnerable version range: `<=2026.3.28`\n- Patched versions: `>= 2026.3.31`\n- First stable tag containing the fix: `v2026.3.31`\n\n#",
      "severity": "critical",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-863",
      "cwe_name": "Incorrect Authorization",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-02T20:59:29Z",
      "updated": "2026-04-02T20:59:31Z",
      "refs": [
        "https://github.com/advisories/GHSA-g5cg-8x5w-7jpm"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-hhq4-97c2-p447",
      "title": "OpenClaw: Zalo webhook replay cache cross-target messageId scope bypass",
      "description": "## Summary\nZalo webhook replay cache cross-target messageId scope bypass\n\n## Current Maintainer Triage\n- Status: narrow\n- Normalized severity: low\n- Assessment: v2026.3.28 replay dedupe is still keyed too broadly, but the issue should stay scoped to authenticated sibling-target delivery paths rather than arbitrary unauthenticated attackers.\n\n## Affected Packages / Versions\n- Package: `openclaw` (n",
      "severity": "low",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-294",
      "cwe_name": "Authentication Bypass by Capture-replay",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-02T20:59:11Z",
      "updated": "2026-04-02T20:59:11Z",
      "refs": [
        "https://github.com/advisories/GHSA-hhq4-97c2-p447"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Play",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 60.0,
      "priority_band": "P2",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "GHSA-jjw7-3vjf-fg5j",
      "title": "OpenClaw Nostr privateKey config redaction bypass leaks plaintext signing key via config.get",
      "description": "## Summary\nOpenClaw Nostr privateKey config redaction bypass leaks plaintext signing key via config.get\n\n## Current Maintainer Triage\n- Status: open\n- Normalized severity: medium\n- Assessment: v2026.3.28 still models Nostr privateKey as plain string so config views can expose it, and the secret-schema fix is unreleased.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Latest publishe",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-200",
      "cwe_name": "Exposure of Sensitive Information to an Unauthorized Actor",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-02T20:58:08Z",
      "updated": "2026-04-02T20:58:11Z",
      "refs": [
        "https://github.com/advisories/GHSA-jjw7-3vjf-fg5j"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-7ggg-pvrf-458v",
      "title": "OpenClaw: PIP_INDEX_URL and UV_INDEX_URL bypass host exec env sanitization and redirect Python package-index traffic",
      "description": "## Summary\n`PIP_INDEX_URL` and `UV_INDEX_URL` bypass host exec env sanitization and redirect Python package-index traffic\n\n## Current Maintainer Triage\n- Status: narrow\n- Normalized severity: high\n- Assessment: v2026.3.28 still allows Python package-index env redirection through host exec, but scope should stay limited to approved or allowlisted package-management exec paths, not arbitrary remote ",
      "severity": "high",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-807",
      "cwe_name": "Reliance on Untrusted Inputs in a Security Decision",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-02T20:57:44Z",
      "updated": "2026-04-02T20:57:46Z",
      "refs": [
        "https://github.com/advisories/GHSA-7ggg-pvrf-458v"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "GHSA-89r3-6x4j-v7wf",
      "title": "OpenClaw: Voice-call Plivo replay mutates in-process callback origin before replay rejection",
      "description": "## Summary\nVoice-call Plivo replay mutates in-process callback origin before replay rejection\n\n## Current Maintainer Triage\n- Status: narrow\n- Normalized severity: low\n- Assessment: v2026.3.28 can still mutate Plivo callback origin before replay rejection, but this needs a captured valid callback for a live call so medium is overstated.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n",
      "severity": "low",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-294",
      "cwe_name": "Authentication Bypass by Capture-replay",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-02T20:57:02Z",
      "updated": "2026-04-02T20:57:06Z",
      "refs": [
        "https://github.com/advisories/GHSA-89r3-6x4j-v7wf"
      ],
      "nvd_enriched": false,
      "ransomware": true,
      "itw": true,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "Play",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 60.0,
      "priority_band": "P2",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0 | RANSOMWARE+35 | ITW+25"
    },
    {
      "cve": "GHSA-mhgq-xpfq-6r66",
      "title": "OpenClaw: Unauthenticated plugin-auth HTTP routes receive operator runtime scopes",
      "description": "## Summary\nUnauthenticated plugin-auth HTTP routes receive operator runtime scopes\n\n## Current Maintainer Triage\n- Status: narrow\n- Normalized severity: medium\n- Assessment: v2026.3.28 still gives auth:\"plugin\" routes operator WRITE_SCOPE, but impact should stay limited to plugin routes that actually touch privileged runtime actions before plugin auth completes.\n\n## Affected Packages / Versions\n- ",
      "severity": "medium",
      "cvss": 0.0,
      "cvss_vector": null,
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "openclaw",
      "cwe": "CWE-269",
      "cwe_name": "Improper Privilege Management",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-02T20:46:03Z",
      "updated": "2026-04-02T20:46:04Z",
      "refs": [
        "https://github.com/advisories/GHSA-mhgq-xpfq-6r66"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 0.0,
      "priority_band": "P3",
      "score_breakdown": "CVSS 0.0×6=0.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-34976",
      "title": "Dgraph: Pre-Auth Database Overwrite + SSRF + File Read via restoreTenant Missing Authorization",
      "description": "The `restoreTenant` admin mutation is missing from the authorization middleware config (`admin.go:499-522`), making it completely unauthenticated. Unlike the similar `restore` mutation which requires Guardian-of-Galaxy authentication, `restoreTenant` executes with zero middleware.\n\nThis mutation accepts attacker-controlled backup source URLs (including `file://` for local filesystem access), S3/Mi",
      "severity": "critical",
      "cvss": 10.0,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "go",
      "product": "github.com/dgraph-io/dgraph/v25",
      "cwe": "CWE-862",
      "cwe_name": "Missing Authorization",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-02T20:44:36Z",
      "updated": "2026-04-02T20:44:38Z",
      "refs": [
        "https://github.com/advisories/GHSA-p5rh-vmhp-gvcw"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 60.0,
      "priority_band": "P2",
      "score_breakdown": "CVSS 10.0×6=60.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-27877",
      "title": "Grafana public dashboards disclose all direct mode datasources",
      "description": "When using public dashboards and direct data-sources, all direct data-sources' passwords are exposed despite not being used in dashboards.\n\nNo passwords of proxied data-sources are exposed. We encourage all direct data-sources to be converted to proxied data-sources as far as possible to improve your deployments' security.",
      "severity": "medium",
      "cvss": 6.5,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
      "epss": 0.00013,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "go",
      "product": "github.com/grafana/grafana",
      "cwe": "CWE-200",
      "cwe_name": "Exposure of Sensitive Information to an Unauthorized Actor",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-03-27T15:30:25Z",
      "updated": "2026-04-02T20:43:51Z",
      "refs": [
        "https://github.com/advisories/GHSA-3q27-7qjq-p9c5"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 39.02,
      "priority_band": "P3",
      "score_breakdown": "CVSS 6.5×6=39.0 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-34950",
      "title": "fast-jwt: Incomplete fix for CVE-2023-48223: JWT Algorithm Confusion via Whitespace-Prefixed RSA Public Key",
      "description": "### Summary\n The fix for GHSA-c2ff-88x2-x9pg (CVE-2023-48223) is incomplete. The publicKeyPemMatcher regex in fast-jwt/src/crypto.js uses a ^ anchor that is defeated by any leading whitespace in the key string, re-enabling the exact same JWT algorithm confusion attack that the CVE patched.\n\n### Details\n The fix for CVE-2023-48223 (https://github.com/nearform/fast-jwt/commit/15a6e92, v3.3.2) change",
      "severity": "critical",
      "cvss": 9.1,
      "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
      "epss": 0.0,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "npm",
      "product": "fast-jwt",
      "cwe": "CWE-327",
      "cwe_name": "Use of a Broken or Risky Cryptographic Algorithm",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-02T20:37:54Z",
      "updated": "2026-04-02T20:37:54Z",
      "refs": [
        "https://github.com/advisories/GHSA-mvf2-f6gm-w987"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 54.6,
      "priority_band": "P3",
      "score_breakdown": "CVSS 9.1×6=54.6 | EPSS 0.000×120=0.0"
    },
    {
      "cve": "CVE-2026-34835",
      "title": "Rack::Request accepts invalid Host characters, enabling host allowlist bypass",
      "description": "## Summary\n\n`Rack::Request` parses the `Host` header using an `AUTHORITY` regular expression that accepts characters not permitted in RFC-compliant hostnames, including `/`, `?`, `#`, and `@`. Because `req.host` returns the full parsed value, applications that validate hosts using naive prefix or suffix checks can be bypassed.\n\nFor example, a check such as `req.host.start_with?(\"myapp.com\")` can b",
      "severity": "medium",
      "cvss": 4.8,
      "cvss_vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
      "epss": 0.00041,
      "kev": false,
      "remote": false,
      "poc": false,
      "vendor": "rubygems",
      "product": "rack",
      "cwe": "CWE-1286",
      "cwe_name": "Improper Validation of Syntactic Correctness of Input",
      "source": "GHSA",
      "sources": [
        "GHSA"
      ],
      "published": "2026-04-02T20:36:40Z",
      "updated": "2026-04-02T20:36:42Z",
      "refs": [
        "https://github.com/advisories/GHSA-g2pf-xv49-m2h5"
      ],
      "nvd_enriched": false,
      "ransomware": false,
      "itw": false,
      "greynoise_trending": false,
      "threat_actor": "",
      "country_origin": "",
      "campaign": "",
      "ransomware_gang": "",
      "exploitdb_id": "",
      "otx_pulse_count": 0,
      "greynoise_count": 0,
      "priority_score": 28.85,
      "priority_band": "P3",
      "score_breakdown": "CVSS 4.8×6=28.8 | EPSS 0.000×120=0.0"
    }
  ],
  "new_cves": []
}